?
Solved

File security issue

Posted on 2004-04-28
5
Medium Priority
?
177 Views
Last Modified: 2013-12-04
I have a file on my server that contains personal and confidential information. I want to allow certain users to be able to read the file or print the file, but CAN'T attach the file into a email and send it to someone. Is there anyway to achieve this in Windows 2000 Server or would I have to buy a 3rd party software package?
0
Comment
Question by:Djrobluv
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 2

Expert Comment

by:LeftofCool
ID: 10943865
When you say you can't, are you fearing interception or physically cannot attach the file to an e-mail.
0
 
LVL 16

Expert Comment

by:JamesDS
ID: 10947241
Djrobluv
Using the tools you have available (IE installed with the OS) it is impossible to stop a user that has read access from attaching the file to an email.

There may be tools out there that apply a policy to outlook, a firewall or a mailserver to do similar jobs, but what would stop a user from simply opening the file and copying the content into an email directly or even another file and attaching that.

Cheers

JamesDS
0
 

Author Comment

by:Djrobluv
ID: 10948614
Sorry I didn't mention the file is a PDF.
0
 

Author Comment

by:Djrobluv
ID: 10948618
LeftofCool ; that is physically attach it to a email
0
 
LVL 16

Accepted Solution

by:
JamesDS earned 375 total points
ID: 10948761
Djrobluv
The file type is irrelevant, PDFs can still be copied to another file and that attached to an email without any restrictions.

Cheers

JamesDS
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses
Course of the Month14 days, 8 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question