Solutions

Digital Rights Management

  • What is DRM (Digital Rights Management)?

    Digital Rights Management

    Digital rights management (DRM) is a class of technologies that are used by hardware manufacturers, publishers, holders, and individuals with the intent to control the use of digital content and devices after sale. There are, however many competing definitions. With First-generation DRM software, the intent is to control copying while Second-generation DRM schemes seek to control viewing, copying, printing, and altering of works or devices. The term is also sometimes referred to as copy protection, copy prevention, and copy control, although the correctness of doing so is disputed. DRM is a set of access control technologies.

    Companies such as Amazon, Apple AT&T, AOL, Apple inc. Google, BBC, Microsoft, Electronic Arts, and Sony use digital rights management. In 1998, the Digital Millennium Copyright Act (DMCA) was passed in the United States to impose criminal penalties on those who make available technologies whose primary purpose and functions are to circumvent content protection technologies.

  • Features of DRM (Digital Rights Management)

     .   Reduce the risk of theft and misuse of sensitive information.

    .   Protect, manage, and monitor the use of sensitive documents outside the firewall.

    .   Eliminate costly design errors through revision control during the design process and across the supply chain.

    .   Rights manage sensitive information from a wide range of applications and file formats.

  • Benefits of DRM (Digital Rights Management)

    . Protect intellectual property and personally identifying information against accidental or malicious disclosure without impacting productivity or collaboration.

    . Ensure internal and external recipients have direct access to the latest version of a document, regardless of where or when they need it.

    . Dynamic policy control so you can change who is authorized to view content no matter where files are located – on websites, CDs, employee laptops, or partners’ computers.

    . Policy control is persistent throughout the information lifecycle as documents are generated and protected on the desktop and server.

    . Determine who is accessing documents, as well as where and when, speeding communication.