About restricting access with Information Rights Management

Which Office program are you using?

Word

Excel

PowerPoint

Outlook

Word

Information Rights Management (IRM) allows individuals and administrators to set access permissions to documents, workbooks, presentations, and e-mail messages. This helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a file is restricted by using IRM, the access and usage restrictions are enforced even if the file reaches unintended recipients. This is because the access permissions are stored in the document, workbook, presentation, or e-mail message itself. And these must be authenticated against the server.

IRM helps people to enforce their personal preferences for the transmission of personal or private information. IRM also helps organizations enforce corporate policy governing the control and dissemination of confidential or proprietary information.

More specifically, IRM helps do the following:

  • Prevent an authorized recipient of restricted content from forwarding, copying, changing, printing, faxing, or pasting the content for unauthorized use

  • Restrict content wherever it is sent

  • Provide file expiration so that content in documents can no longer be viewed after a specified time

  • Enforce corporate policies that govern the use and dissemination of content within the company

IRM can't prevent restricted content from being:

  • Erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain kinds of spyware

  • Lost or corrupted because of the actions of computer viruses

  • Hand-copied or retyped from a display on a recipient's screen

  • Digitally photographed (when displayed on a screen) by a recipient

  • Copied by using third-party screen-capture programs

See also

Restrict permission to content in a file

Open a file that has restricted permissions

Add credentials to open a rights-managed file or message

File formats that work with IRM

Excel

Information Rights Management (IRM) allows individuals and administrators to set access permissions to documents, workbooks, presentations, and e-mail messages. This helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a file is restricted by using IRM, the access and usage restrictions are enforced even if the file reaches unintended recipients. This is because the access permissions are stored in the document, workbook, presentation, or e-mail message itself. And these must be authenticated against the server.

IRM helps people to enforce their personal preferences for the transmission of personal or private information. IRM also helps organizations enforce corporate policy governing the control and dissemination of confidential or proprietary information.

More specifically, IRM helps do the following:

  • Prevent an authorized recipient of restricted content from forwarding, copying, changing, printing, faxing, or pasting the content for unauthorized use

  • Restrict content wherever it is sent

  • Provide file expiration so that content in documents can no longer be viewed after a specified time

  • Enforce corporate policies that govern the use and dissemination of content within the company

IRM can't prevent restricted content from being:

  • Erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain kinds of spyware

  • Lost or corrupted because of the actions of computer viruses

  • Hand-copied or retyped from a display on a recipient's screen

  • Digitally photographed (when displayed on a screen) by a recipient

  • Copied by using third-party screen-capture programs

See also

Restrict permission to content in a file

Open a file that has restricted permissions

Add credentials to open a rights-managed file or message

File formats that work with IRM

PowerPoint

Information Rights Management (IRM) allows individuals and administrators to set access permissions to documents, workbooks, presentations, and e-mail messages. This helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a file is restricted by using IRM, the access and usage restrictions are enforced even if the file reaches unintended recipients. This is because the access permissions are stored in the document, workbook, presentation, or e-mail message itself. And these must be authenticated against the server.

IRM helps people to enforce their personal preferences for the transmission of personal or private information. IRM also helps organizations enforce corporate policy governing the control and dissemination of confidential or proprietary information.

More specifically, IRM helps do the following:

  • Prevent an authorized recipient of restricted content from forwarding, copying, changing, printing, faxing, or pasting the content for unauthorized use

  • Restrict content wherever it is sent

  • Provide file expiration so that content in documents can no longer be viewed after a specified time

  • Enforce corporate policies that govern the use and dissemination of content within the company

IRM can't prevent restricted content from being:

  • Erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain kinds of spyware

  • Lost or corrupted because of the actions of computer viruses

  • Hand-copied or retyped from a display on a recipient's screen

  • Digitally photographed (when displayed on a screen) by a recipient

  • Copied by using third-party screen-capture programs

See also

Restrict permission to content in a file

Open a file that has restricted permissions

Add credentials to open a rights-managed file or message

File formats that work with IRM

Outlook

Information Rights Management (IRM) allows individuals and administrators to set access permissions to documents, workbooks, presentations, and e-mail messages. This helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a file is restricted by using IRM, the access and usage restrictions are enforced even if the file reaches unintended recipients. This is because the access permissions are stored in the document, workbook, presentation, or e-mail message itself. And these must be authenticated against the server.

IRM helps people to enforce their personal preferences for the transmission of personal or private information. IRM also helps organizations enforce corporate policy governing the control and dissemination of confidential or proprietary information.

Note: For information about how you can restrict permission to content in e-mail messages, see Create a message with restricted permission.

More specifically, IRM helps do the following:

  • Prevent an authorized recipient of restricted content from forwarding, copying, changing, printing, faxing, or pasting the content for unauthorized use

  • Restrict content wherever it is sent

  • Provide file expiration so that content in documents can no longer be viewed after a specified time

  • Enforce corporate policies that govern the use and dissemination of content within the company

IRM can't prevent restricted content from being:

  • Erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain kinds of spyware

  • Lost or corrupted because of the actions of computer viruses

  • Hand-copied or retyped from a display on a recipient's screen

  • Digitally photographed (when displayed on a screen) by a recipient

  • Copied by using third-party screen-capture programs

See also

Add credentials to open a rights-managed file or message

File formats that work with IRM

Share Facebook Facebook Twitter Twitter Email Email

Was this information helpful?

Great! Any other feedback?

How can we improve it?

Thank you for your feedback!

×