Quote:
Originally Posted by TES
what I am sending is proprietary information which whilst being encrypted by DRM, wouldn't stop whomever I am giving it to from downloading to another device which could be read by a third party.
|
That precisely what most DRM systems are designed to do.
But odds are, both the DRM system, and whatever additional password you might implement, can be easily bypassed by anyone with the desire to do so.
By putting two on, you double the inconvenience to the legitimate user, while doing virtually nothing to improve the real security of the information, all in the name of increasing a false sense of security.
How can you provide REAL security for your information? Good question. Assuming you are not prepared to go the military route and provide the information only to security-cleared personnel in a secured environment, you could start by distributing the information only to people you trust, who have be properly informed (via NDA, threat of lawsuit, etc) of how to handle the information. Then any one technological method would be an adequate "honest persons lock."
Relying completely on technology for information security is like relying on the safety lever for firearm security. (That's a very bad thing, for those not familiar with firearms....)
ApK