Identify Leakers
Document originators can opt to add steganographic or overt dynamic watermarks that are
in-motion floating and uniquely identifiable to each authorized recipient. In the overt
mode, readers visually see that if they were to share a snapshot of any one page or part
of a page, they would be at risk of the leak being easily traced back to them. As a
result, RDocs™ document control not only discourages unauthorized sharing (in the overt
mode), but can further provide court-admissible proof of who shared any unauthorized
snapshot of a document (in steganographic or overt mode). We call this Leakers Folly.
Advanced
Content Controls
Document Owners can restrict printing, add a “draft”,
“confidential” or company logo watermark, timestamp the original document, receive proof
of sending and notification of reads, and more. Even after the share, Document Owners
have the option to pause or revoke access to their documents for all readers, one or
some.
This way, RDocs™ protection not only prevents unauthorized distribution, but
also adds security layers to further discourage leaking.
Self-Destruct
on a Timer
Users can set a timer to ensure confidential files are destroyed
after a specified time. Once the timer is set, RDocs™ technology destroys the file
automatically. This provides an extra layer of security for businesses that deal with
sensitive information and want to ensure that their confidential documents cannot be
accessed after a certain period of time.
Printing
Restrictions
RDocs™ system allows users to disable printing of their sensitive
documents. With RDocs™ content controls, users can be assured that unauthorized users
will not be able to print their confidential information, providing an additional layer
of protection against data breaches.