Feeds

Microsoft devs Windows Rights Management Services

Tool to plug corporate leaks

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Microsoft outlined plans on Friday (Dec 22) to develop technology which controls what users can do with sensitive business documents.

a href="http://www.microsoft.com/windowsserver2003/rm" target="_blank">Windows Rights Management Services (otherwise known as RMS (...RMS??? ed), a new technology for Windows Server 2003, will restrict the ability of recipients to print or forward confidential files, including financial reports, legal and planning documents. Just the thing to prevent embarrassing leaks then, at least in theory.

Stuart Okin, chief security officer of Microsoft UK, tells us that Windows Rights Management Services is essentially an intranet-based application, and the technology is still very much in development. At first, the system will be useful only for guarding Office 2003 files; but this will expand to cover broader range of Web content and sensitive corporate documents.

Using Windows Rights Management Services, applications such as information portals, word processors or email clients can be built so that users can designate both who has access to specific content and what kind of access rights they can have. The server manages rights and policy, while clients running RMS-enabled applications allow users to apply rights to content.

For example, Windows Rights Management Services can be used to control forwarding, copying and printing, or to set up time-based expiration rules. In addition, enterprises can enforce policy using centrally delivered templates to automate the process.

RMS technology uses XrML (Extensible Rights Markup Language), an emerging standard for the expression of rights on digital content. Microsoft will release two software development kits in the second quarter of 2003 to enable developers to begin to build rights management capabilities into intranet and Windows client applications.

Beta code for Windows Rights Management Services will be broadly available in the second quarter of 2003, Microsoft promises. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.