Information rights management

This can cause confusion, because digital rights management (DRM) technologies are typically associated with business-to-consumer systems designed to protect rich media such as music and video.

A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications.

IRM technologies typically have a number of features that allow an owner to control, manage and secure information from unwanted access.

Key management is used to protect the information whilst it is at rest on a hard disk, network drive or other storage device.

Functionality such as preventing screen shots, disallowing the copying of data from the secure document to an insecure environment and guarding the information from programmatic attack, are key elements of an effective IRM solution.