Home >
Information Security: Document Permissions Are The Key To Security Control.
"P" this year's "two sessions" an important term has been mentioned, that is, information security. < /p >
< p > in the era of rapid development of information technology and < a href= "http://www.91se91.com/news/index_c.asp" > Internet < /a >, information security is becoming a topic of increasing concern. With the deepening of information technology and network, information security has become more and more popular and has gradually become a livelihood topic of a country. < /p >
< p > while we are constantly discussing information security, many people do not assume that if information security is an individual or even a "person", how can it communicate with us, what will it tell us? < /p >
< p > "because of the continuous development of information and network technology, modern enterprises are advancing on the road of informatization. However, no matter how far or forward, the main body that needs protection inside the enterprise is still those data and information itself. As a document that carries the information and data carrier, it has become the key to protection. Further inference is made. If we want to control the information security of enterprises, we must start with the safety control of documents." < /p >
< p > "access control is the most important means for document control. With the continuous development of protection technology and access control technology, we can have more detailed management of document permissions. < /p >
< p > Information Security: "meticulous management of documents can be divided into: read-only, write, download, offline, delete, rename, print, etc." < /p >
< p > read only: files can only be read by specific users, and can not be edited, saved or modified. For those who do not have read only permission, they are garbled. < /p >
< p > < a href= "http://www.91se91.com/news/index_c.asp > > Edit < /a >: files can be modified in various ways. After the file is modified, the author of the document will become the modifier himself. < /p >
< p > Copy: files can be opened in specific places, and copy can not be used elsewhere. < /p >
< p > printing: the file has no print permissions, and the user print indicates no specific permissions. Users need to print, and must undergo an approval process. < /p >
< p > screenshot: users can manipulate files, but they can't divulge files through QQ. < /p >
< p > Download: files can only be used on specific servers, and copy is not available locally. < /p >
< p > offline: files can only be used within the organization and bring out the organizational environment (even in legitimate offline notebooks). < /p >
< p > time: the file has the limitation of opening time. < /p >
< p > times: there are restrictions on the number of files to be opened. < /p >
< p > and now the fine protective effect can be achieved by the document permissions of Shan Li waterproofing wall < a href= "http://www.91se91.com/news/index_c.asp" > management module < /a >. At the same time, the module can achieve the following protective effect. < /p >
< p > [publish permission] set the permissions of the author's encrypted documents to other users. In the medium-sized enterprises, there are different departments and heads of departments. In the document authority management module of Shan Li network, the permissions and readmissions of departmental staff are set up to restrict employees' access to the documents of department heads. They can only read, do not edit, save or modify, so as to protect the safety of enterprise documents. < /p >
< p > [superior authority] set the author as the authority of the higher level to encrypt documents to other users. The implementation effect of this permission is just the opposite of the issuing authority. The person in charge of a different project team or a senior project team leader would like to view the files of other project groups or lower level project groups, but because of the requirement of ensuring confidentiality of documents, medium-sized enterprises can set up superior authority. < /p >
< p > author permission to set author's permission to encrypt documents. The purpose of the authority is to dispose of the employees who intentionally or unintentionally destroy the documents created or processed during the service. < /p >
< p > in the era of rapid development of information technology and < a href= "http://www.91se91.com/news/index_c.asp" > Internet < /a >, information security is becoming a topic of increasing concern. With the deepening of information technology and network, information security has become more and more popular and has gradually become a livelihood topic of a country. < /p >
< p > while we are constantly discussing information security, many people do not assume that if information security is an individual or even a "person", how can it communicate with us, what will it tell us? < /p >
< p > "because of the continuous development of information and network technology, modern enterprises are advancing on the road of informatization. However, no matter how far or forward, the main body that needs protection inside the enterprise is still those data and information itself. As a document that carries the information and data carrier, it has become the key to protection. Further inference is made. If we want to control the information security of enterprises, we must start with the safety control of documents." < /p >
< p > "access control is the most important means for document control. With the continuous development of protection technology and access control technology, we can have more detailed management of document permissions. < /p >
< p > Information Security: "meticulous management of documents can be divided into: read-only, write, download, offline, delete, rename, print, etc." < /p >
< p > read only: files can only be read by specific users, and can not be edited, saved or modified. For those who do not have read only permission, they are garbled. < /p >
< p > < a href= "http://www.91se91.com/news/index_c.asp > > Edit < /a >: files can be modified in various ways. After the file is modified, the author of the document will become the modifier himself. < /p >
< p > Copy: files can be opened in specific places, and copy can not be used elsewhere. < /p >
< p > printing: the file has no print permissions, and the user print indicates no specific permissions. Users need to print, and must undergo an approval process. < /p >
< p > screenshot: users can manipulate files, but they can't divulge files through QQ. < /p >
< p > Download: files can only be used on specific servers, and copy is not available locally. < /p >
< p > offline: files can only be used within the organization and bring out the organizational environment (even in legitimate offline notebooks). < /p >
< p > time: the file has the limitation of opening time. < /p >
< p > times: there are restrictions on the number of files to be opened. < /p >
< p > and now the fine protective effect can be achieved by the document permissions of Shan Li waterproofing wall < a href= "http://www.91se91.com/news/index_c.asp" > management module < /a >. At the same time, the module can achieve the following protective effect. < /p >
< p > [publish permission] set the permissions of the author's encrypted documents to other users. In the medium-sized enterprises, there are different departments and heads of departments. In the document authority management module of Shan Li network, the permissions and readmissions of departmental staff are set up to restrict employees' access to the documents of department heads. They can only read, do not edit, save or modify, so as to protect the safety of enterprise documents. < /p >
< p > [superior authority] set the author as the authority of the higher level to encrypt documents to other users. The implementation effect of this permission is just the opposite of the issuing authority. The person in charge of a different project team or a senior project team leader would like to view the files of other project groups or lower level project groups, but because of the requirement of ensuring confidentiality of documents, medium-sized enterprises can set up superior authority. < /p >
< p > author permission to set author's permission to encrypt documents. The purpose of the authority is to dispose of the employees who intentionally or unintentionally destroy the documents created or processed during the service. < /p >
- Related reading
- Local hotspot | The Qualified Rate Of The 105 Batches Of Samples In The Xinjiang Wu Jia Qu Inspection Institute Is 92.4%.
- Industry perspective | China'S Leather Industry Is Facing Important Changes And Urgent Pformation.
- News Republic | Shenzhen Fashion Corps Debut In 2014 Spring Summer New York Fashion Week
- Industry Overview | 國內服裝行業最新資訊速覽(9.12)
- Women's Shoes | Coach 2013秋冬系列女鞋時尚來襲
- Global Perspective | 山東如意救贖莊吉服裝 品牌整合成難題
- Enterprise information | Emma CNC China International Leather Exhibition Surprises
- international standard | New Standard Of National Cotton Storage To Improve The Market
- News Republic | 服裝:男裝“挾洋自重”價格離譜
- Zhejiang | The Nineteenth China International Chemical Fiber Conference Was Held In Tongxiang, Zhejiang Recently.
- "Wuhan Textile University Garment Professional Postgraduate Practice Base" Officially Unveiled
- Private Cloud Disk To Solve Enterprise Document Sharing Problems
- Shenzhen Is Planning To Build A Local Clothing Institute To Solve The Shortage Of Creative Talents.
- 桌面虛擬化趨勢之下如何保護桌面文檔
- Lafayette Department Store Became The Second Largest Shareholder Of Carrefour.
- Documents In Agile: How Much And When To Write?
- New Balance Will Strengthen The Supervision Of Counterfeit Goods In China.
- OA System: From Document Management To Knowledge Management
- Shimao International Plaza Opens Fast Fashion Brand Sweeps Spring City
- RMB Exchange Rate Reform And Pformation Of China'S Economic Development Mode