Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Lock down Microsoft Word

Posted on 2015-01-07
7
Medium Priority
?
178 Views
Last Modified: 2015-02-02
Hi,

A client of mine is asking if we can lock down files such as MS word and excel to stop staff from copying the context of the documents and using them for another company, basically they want to stop staff from stealing important documentation and using it at a new employer if they ever leave.

For now I have marked the folder with the relevant documents in as read only but this will not stop staff from saving the files off as a different name or copying and pasting into a new document.

I don't think anything can be done but thought I would ask he question anyway.

Thanks
R
0
Comment
Question by:ryank85
7 Comments
 
LVL 37

Assisted Solution

by:Neil Russell
Neil Russell earned 800 total points
ID: 40536588
Have a good read all about DRM Digital Rights Management OR Information Rights Management.

Lots of offerings although Microsoft do do there own and that works as well as any.

https://support.office.com/en-gb/article/Information-Rights-Management-in-Office-2010-c7a70797-6b1e-493f-acf7-92a39b85e30c?ui=en-US&rs=en-GB&ad=GB
0
 
LVL 22

Accepted Solution

by:
rspahitz earned 800 total points
ID: 40536912
You could always save the Word doc as a PDF, which can be made read-only so the text cannot be copied, or otherwise turn the doc into an image.  Of course, that means that you will no longer be able to edit the document unless you have a master file elsewhere saved in Word (in which case, you'll need to have file-level permissions set to prevent these same people from getting to the originals.
0
 
LVL 37

Assisted Solution

by:Neil Russell
Neil Russell earned 800 total points
ID: 40536936
There are lots of free tools and web services that will extract Text and images from PDF files.

DRM/IRM is the only way to make a real stab at protection.  But so long as you allow printing or screen shots to be taken, you have lost the battle.
0
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

 
LVL 23

Assisted Solution

by:Danny Child
Danny Child earned 400 total points
ID: 40536943
Even PDFs are vulnerable, but you can get plug-ins to help with it, but it's not an easy issue to resolve.   Users can take screenshots of documents, or even use a mobile phone to take pictures of the screen.

If they really want to nail it down, one that I've seen used on documents sent to us is LockLizard:
http://www.locklizard.com/pdf_security.htm

You may also want to review employment contracts with staff in terms of Intellectual Property and related penalties for theft of data.  

Also, lock down USB sockets and writeable media to prevent data exports, and also limit (and log) all email access so all attachments are monitored.    We use Lumension Device Control - pretty solid.
https://www.lumension.com/device-control-software/usb-security-protection.aspx

Or, make the job so cool that no-one wants to leave, ever!
0
 
LVL 22

Assisted Solution

by:rspahitz
rspahitz earned 800 total points
ID: 40537170
Ultimately, this probably comes down to the legal department making sure that all employees sign agreements that they won't take company info without permission so that the company protects itself.  It doesn't mean that it won't happen, but the company can take legal action to help itself.
Oh, and having digital "watermarks", like Google has on its maps, could help since it's hard to take those out of images of things.
0
 
LVL 49

Expert Comment

by:Martin Liss
ID: 40584430
I've requested that this question be closed as follows:

Accepted answer: 125 points for Neilsr's comment #a40536588
Assisted answer: 125 points for DanCh99's comment #a40536943
Assisted answer: 125 points for rspahitz's comment #a40537170
Assisted answer: 125 points for rspahitz's comment #a40536912

for the following reason:

This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes how to use a set of graphical playing cards to create a Draw Poker game in Excel or VB6.
After seeing numerous questions for Dynamic Data Validation I notice that most have used Visual Basic to solve the problem. This suggestion is purely formula based and can be used in multiple rows.
This Micro Tutorial will demonstrate how to use a scrolling table in Microsoft Excel using the INDEX function.
This Experts Exchange video Micro Tutorial shows how to tell Microsoft Office that a word is NOT spelled correctly. Microsoft Office has a built-in, main dictionary that is shared by Office apps, including Excel, Outlook, PowerPoint, and Word. When …

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question