Enterprise Rights Management (ERM)
Enterprise rights management
The first component of our data security strategy is enforced using an enterprise rights management (ERM) solution. ERM allows Sterling-Hoffman to implement automated processes whereby access and usage controls are applied the moment a document is created. While encrypting every document may seem a bit onerous, our clients' privacy is a huge concern in our business. There could be major professional ramifications if our customers' superiors knew they were actively seeking employment elsewhere-not to mention stock market implications. For us, it's better to be on the safe side and ensure the security of sensitive documents.
Similar to many enterprises today, Sterling-Hoffman is fully engaged with the flat business world. Much of our work is both derived and delivered around the globe so our automated encryption tactics serve us especially well internationally. ERM provides files with enforceable access and usage controls to data that is sent from our corporate IT infrastructure to any other third party. Offshore offices and business partners are sources of major data leak vulnerabilities because many countries do not have the business and data security laws we enjoy in the United States.
As it is impossible to monitor how our overseas partners work with the information we provide to them, ERM's ability to limit how users are able to interact with data (for example, disallowing sensitive documents to be printed or copying/pasting information from one format to another) gives us an additional layer of security outside of pure access control.