How to: Three ways to protect PDF documents

By
How to: Three ways to protect PDF documents

How can you safeguard your documents?

Losing sensitive data costs companies an average of $3.8 million per security breach, a recent study carried out by the Ponemon Institute has found.

As well as the financial risk involved, the company's reputation and loss of customer loyalty are also at stake when internal information falls into the wrong hands, not to mention the consequences if legal requirements are breached.

Safeguarding the many documents that a company creates, distributes, edits and stores throughout those documents' lifecycle is an extremely difficult task, particularly when it comes to paper documents.

Managing documents in digital processes based on the PDF format offers a far more secure alternative, with many professional PDF tools already featuring security functions that can be combined with appropriate tools to create an end-to-end secure workflow. In fact, 72% of IT experts surveyed by the Ponemon Institute believe that document security can contribute to maintaining data confidentiality, integrity, authenticity, availability and usability.

There are a number of different ways to protect PDF documents at all stages of the workflow to ensure that data doesn't fall into the wrong hands.

Password protection

A good PDF solution will allow differentiated access for creating, editing, saving, printing and reading PDF documents. In terms of password protection, there are two levels that are necessary for a sufficient level of security: permission to open a document and permission to edit it.

Protecting the document against being opened is important if only a defined group of recipients is allowed to open it. One example is if confidential information is sent by email - in principle, anyone who gains access to the email can also read the document. However, if the document is secured with a password, only the actual intended recipient in possession of the correct password will be able to open it.

Permissions passwords play an important role, particularly when collaborating with internal or external co-workers, or when communicating with customers. For example, team members may be able to view, print out and add comments to a project plan, but should not be allowed to remove or add pages to it. Similarly, customers should be able to fill in forms and sign documents, but not to modify the text in any way.

Confidential information removal

In many circumstances, personal data should be removed before a document is circulated to protect it, in a process often referred to as redacting. It is not enough to simply put a black line across the information that should be concealed, as an experienced PDF user would easily be able to remove this line again. Instead, the information must actually be removed permanently. Redacting the section in question simply indicates that sensitive data has been removed, which is particularly relevant for authorities and other public bodies that are required by law to highlight where information has been removed.

All private companies have to handle personal information that is subject to data protection, and must not be passed on to third parties. Therefore, a PDF tool must be capable of permanently removing this information in a traceable way, including potentially revealing metadata and hidden information.

Certificate-based signatures

It is becoming increasingly common to sign documents with a digital ID, which approximately corresponds to a signature on a paper document. If unauthorised changes are made to a document after it has been signed, the digital signature becomes invalid.

Documents may be signed several times by different people. When deciding on a PDF tool, it's best to opt for an application that not only enables documents to be signed, but also to be stamped with a digitally-authenticated timestamp. This indicates that the contents of any data file haven't been changed since that time.

Digital IDs not only allow a PDF solution to authenticate documents, but also to protect them. This is a process known as certifying, which allows the owner of the document to apply a signature and document protection at the same time. The signee can completely lock the document, or allow certain actions to be available for others such as form filling or commenting.

This article originally appeared at itpro.co.uk

Copyright © ITPro, Dennis Publishing
Tags:

Most Read Articles

Windows 10 Fall Creators Update: 10 of the best new features

Windows 10 Fall Creators Update: 10 of the best new features

Australia gets its own Humble Bundle

Australia gets its own Humble Bundle

Ask Graeme - What is the value of the NBN?

Ask Graeme - What is the value of the NBN?

Review: Synology DS718+ NAS

Review: Synology DS718+ NAS

Would you like to receive

Our Newsletter?