Home >

Information Security: Document Permissions Are The Key To Security Control.

2014/4/20 15:09:00 16

Information SecurityDocument PermissionsSecurity Control

"P" this year's "two sessions" an important term has been mentioned, that is, information security. < /p >
< p > in the era of rapid development of information technology and < a href= "//www.sjfzxm.com/news/index_c.asp" > Internet < /a >, information security is becoming a topic of increasing concern. With the deepening of information technology and network, information security has become more and more popular and has gradually become a livelihood topic of a country. < /p >
< p > while we are constantly discussing information security, many people do not assume that if information security is an individual or even a "person", how can it communicate with us, what will it tell us? < /p >
< p > "because of the continuous development of information and network technology, modern enterprises are advancing on the road of informatization. However, no matter how far or forward, the main body that needs protection inside the enterprise is still those data and information itself. As a document that carries the information and data carrier, it has become the key to protection. Further inference is made. If we want to control the information security of enterprises, we must start with the safety control of documents." < /p >
< p > "access control is the most important means for document control. With the continuous development of protection technology and access control technology, we can have more detailed management of document permissions. < /p >
< p > Information Security: "meticulous management of documents can be divided into: read-only, write, download, offline, delete, rename, print, etc." < /p >
< p > read only: files can only be read by specific users, and can not be edited, saved or modified. For those who do not have read only permission, they are garbled. < /p >
< p > < a href= "//www.sjfzxm.com/news/index_c.asp > > Edit < /a >: files can be modified in various ways. After the file is modified, the author of the document will become the modifier himself. < /p >
< p > Copy: files can be opened in specific places, and copy can not be used elsewhere. < /p >
< p > printing: the file has no print permissions, and the user print indicates no specific permissions. Users need to print, and must undergo an approval process. < /p >
< p > screenshot: users can manipulate files, but they can't divulge files through QQ. < /p >
< p > Download: files can only be used on specific servers, and copy is not available locally. < /p >
< p > offline: files can only be used within the organization and bring out the organizational environment (even in legitimate offline notebooks). < /p >
< p > time: the file has the limitation of opening time. < /p >
< p > times: there are restrictions on the number of files to be opened. < /p >
< p > and now the fine protective effect can be achieved by the document permissions of Shan Li waterproofing wall < a href= "//www.sjfzxm.com/news/index_c.asp" > management module < /a >. At the same time, the module can achieve the following protective effect. < /p >
< p > [publish permission] set the permissions of the author's encrypted documents to other users. In the medium-sized enterprises, there are different departments and heads of departments. In the document authority management module of Shan Li network, the permissions and readmissions of departmental staff are set up to restrict employees' access to the documents of department heads. They can only read, do not edit, save or modify, so as to protect the safety of enterprise documents. < /p >
< p > [superior authority] set the author as the authority of the higher level to encrypt documents to other users. The implementation effect of this permission is just the opposite of the issuing authority. The person in charge of a different project team or a senior project team leader would like to view the files of other project groups or lower level project groups, but because of the requirement of ensuring confidentiality of documents, medium-sized enterprises can set up superior authority. < /p >
< p > author permission to set author's permission to encrypt documents. The purpose of the authority is to dispose of the employees who intentionally or unintentionally destroy the documents created or processed during the service. < /p >
  • Related reading

Private Cloud Disk To Solve Enterprise Document Sharing Problems

Document management
|
2014/4/20 15:04:00
34

桌面虚拟化趋势之下如何保护桌面文档

Document management
|
2014/4/20 14:55:00
24

Documents In Agile: How Much And When To Write?

Document management
|
2014/4/20 14:47:00
19

OA System: From Document Management To Knowledge Management

Document management
|
2014/4/20 14:42:00
25

初志科技:涉密机构电子文档的安全隐患

Document management
|
2014/4/15 22:55:00
58
Read the next article

Ida Ayashi: Fashion Design For Interest Only

Although she has always insisted on her dress design as her hobby and an amateur life, but when she talked about fashion design, the reporter always felt the desire to pursue her fashion dream in her eyes. Perhaps, to enter the field of color poetry is to face the sun, do not ask for spring, only to face the mood of happiness, so that their own way of fashion and wide and wide.