Table of contents
1 Matching policies to the sensitivity
level of data
2 Enforcing and controlling sensitive
information assets
3 Manually securing sensitive
3 Adding protection to
system-generated documents
4 Working securely with Microsoft
PowerPoint presentations
5 Managing access to Microsoft
Excel spreadsheets
5 Safeguarding content in
Microsoft Word
6 Protecting sensitive information
in PDF les
6 Securing collaboration among
engineering teams
8 Summary
Delivering an information
risk management
strategy across the
heterogeneous enterprise
Use Adobe® LiveCycle® Rights Management ES software to
proactively protect sensitive information resident in the most
widely used applications and les
White Paper
To succeed in today’s global economy, businesses face intense pressure to produce and deliver
better products and services to the market faster and more eciently. To achieve this, they need
to exchange sensitive information eciently and extend their business processes to include
partners and suppliers across industries and geographies with diverse regulatory environments.
Organizations should proactively initiate an information risk management strategy to understand
and prioritize risk in a consistent and repeatable way, and then target solutions that map risk
proles to protection levels. Information-centric solutions such as Adobe LiveCycle Rights
Management ES enable this type of strategy by proactively protecting and controlling sensitive
information at the source based on business policy, regardless of where the information resides
or ows inside or outside the enterprise.
Ultimately, the lines-of-business and legal and compliance departments are not concerned with
what documents or le types the sensitive information resides in, but they do require that the
most sensitive information assets are discovered, protected, and ultimately audited to prove
compliance. With this in mind, Adobe’s Rights Management ES solution provides broad coverage
for the most commonly used documents and le types for sensitive information in the enterprise,
including Microso Oce, PDF, and CAD les, enabling protection based on consistent policies
set by the lines-of-business and legal and compliance departments, and executed by IT.
Matching policies to the sensitivity level of data
e term “policy management” is oen overused, but meaningful in deploying a successful
information risk management strategy. Information-centric policies have typically been the
by-product of corporate or government bylaws that are rarely implemented in practice. However,
with the advent of technologies like LiveCycle Rights Management ES, the lines-of-business
can work in conjunction with legal, compliance, and IT to bring information-centric policy
management to life in the enterprise.