Solved

prevent documnets from being printed

Posted on 2007-11-27
5
727 Views
Last Modified: 2012-05-05
I am looking for a product we can use so that users can view documents or part of the access database but they can not print them. i seen a product that someone used where if you printed a doc it turned black. What I am trying to do is make it harder for current employees to steal data. We may remove USB ports and DVD players. any recommendations?
0
Comment
Question by:jeffsteffy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 2

Accepted Solution

by:
kram0 earned 250 total points
ID: 20362812
This isn't your answer, but if users can see it, it can be captured - be it by a screen grab sent to the printer or even a camera.
I'd focus more on limiting access to those who require it and possibly logging activity to make it easier to track down leaks to individuals.
0
 
LVL 7

Assisted Solution

by:ALNMOO
ALNMOO earned 50 total points
ID: 20363568
use PDF files.

in pdf files you can:

1. password protection to open pdf file.
2. password protection to Change Security Options
3. encryption
4. prevent users from printing the file.
5. prevent users from creating form fields, as well as making any other changes.
6.  Disable Accessibility to prevent user from copying text and graphics, and disabling the accessibility interface.
7.....
8....

and more
0
 
LVL 7

Assisted Solution

by:nttranbao
nttranbao earned 200 total points
ID: 20364394
The rule is very simple: once you can see, you can copy. so with a printscreen and a OCR ( optical Character Recognition) software, your information is leaked.

You may want to use PDF and its security set, but, with can be easily cracked/ security removed with some PDF Security remover softwares( i.e Advanced PDF Password Recovery)

Other option: use windows Rights Management Servers.

So you should go on the direction mentioned by kram0: controll access to these files, with logs turned on.
0
 
LVL 2

Author Comment

by:jeffsteffy
ID: 20366230
I have security groups setup in AD which determines which users can see network drives ect. certain users need access to the database for thier jobs, we dont want them taking data and selling it or whatever. could you explain logging activity to make it easier to track down leaks to individuals. How do i do this?
0
 
LVL 2

Expert Comment

by:kram0
ID: 20369372
You can turn on file access auditing in AD using a policy (Computer Configuration => Windows Settings => Security Settings => Local Policies => Audit Policy => Audit Object Access).
Then when you go to the individual files or directories you want monitored, turn on auditing by going to the properties => security => advanced => auditing. Add the group you want to audit (probably "everyone") and set the access to log.
It will then show who has attempted to access monitored files from which machine in the local server's system event log.
0

Featured Post

Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question