Securing Information Outside a Repository

In addition to securing content access in a repository, a pragmatic ECM strategy should control access to an item even after it’s removed from a repository. In other words, it should block access by unauthorized users even if the document is outside your organization’s firewall, and on the opposite side of the planet. Solving this problem is the duty of Information Rights Management.

Imagine your team is tasked with analyzing all the information pertaining to a new acquisition. Perhaps you are being purchased by a larger company, or perhaps you are the acquiring entity. Some of this information is financial, some of it involves research and development, and some contains employee payroll information. ...

Get Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.