This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Information rights management" – news · newspapers · books · scholar · JSTOR(July 2022) (Learn how and when to remove this message)
A major contributor to this article appears to have a close connection with its subject. It may require cleanup to comply with Wikipedia's content policies, particularly neutral point of view. Please discuss further on the talk page.(August 2013) (Learn how and when to remove this message)
(Learn how and when to remove this message)
Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access.[1] It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business-to-consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.
This means that information and its control can now be separately created, viewed, edited and distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies mainly to documents and emails.
^Herrera Montano, Isabel; García Aranda, José Javier; Ramos Diaz, Juan; Molina Cardín, Sergio; de la Torre Díez, Isabel; Rodrigues, Joel J. P. C. (2022-07-14). "Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat". Cluster Computing. 25 (6): 4289–4302. doi:10.1007/s10586-022-03668-2. ISSN 1573-7543.
and 29 Related for: Information rights management information
Informationmanagement (IM) is the appropriate and optimized capture, storage, retrieval, and use of information. It may be personal information management...
Directory RightsManagement Services (AD RMS, known as RightsManagement Services or RMS before Windows Server 2008) is a server software for information rights...
Digital rightsmanagement (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM), such as...
Collective rightsmanagement is the licensing of copyright and related rights by organisations acting on behalf of rights owners. Collective management organisations...
Another major redesign took place April 2018 which introduced new informationrightsmanagement controls designed for business use cases. Gmail makes use of...
BMG RightsManagement GmbH (also known simply as BMG) is an international music company based in Berlin, Germany. It combines the activities of a music...
(Interested party information) is a unique identifying number assigned by the CISAC database to each Interested Party in collective rightsmanagement. It is used...
before Windows Server 2008, is server software that allows for informationrightsmanagement, included with Windows Server. It uses encryption and selective...
Security information and event management (SIEM) is a field within the field of computer security, where software products and services combine security...
In management accounting or managerial accounting, managers use accounting information in decision-making and to assist in the management and performance...
released on May 11, 2004. New features in Office 2003 include informationrightsmanagement; new collaboration features; improved support for SharePoint...
Educational management refers to the administration of the education system in which a group combines human and material resources to supervise, plan,...
normally created by users of Azure Information Protection, Azure RightsManagement or Active Directory RightsManagement Services. The rpmsg file is created...
difficult and time-consuming to send it Informationrightsmanagement improvements with Windows RightsManagement Services and managed policy compliance...
achieve this, the law gives people and businesses property rights to certain information and intellectual goods they create, usually for a limited period...
access rights. Identity management (IdM) is the task of controlling information about users on computers. Such information includes information that authenticates...
multi-national software company that provides data-centric security and informationrightsmanagement (IRM) to help enterprises mitigate data leakage and meet compliance...
have been added such as one-step connectivity with Excel data, informationrightsmanagement (IRM) protection for Visio files, modernized shapes for office...
Bureau of Information Resource Management, responsible for information technology of the U.S. Department of State InformationRightsManagement Intermediate...
Knowledge management (KM) is the collection of methods relating to creating, sharing, using and managing the knowledge and information of an organization...
Content management (CM) are a set of processes and technologies that support the collection, managing, and publishing of information in any form or medium...
models for cultural dissemination and royalty management and work in different fields related to digital rights, networked democracy and freedom of expression...
enterprises. Media management contains the functions strategic management, procurement management, production management, organizational management and marketing...
protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability...
Management Schema outlines a technical schema which can be used to encapsulate license details including contract information, entitlements, rights,...
enterprise data security and informationrightsmanagement platform that provides encryption and tracks and controls digital information shared across users,...