Abstract:
A computing device receives a file. The computing device determines whether the file has previously been scanned for violations of a data loss prevention policy. If the file was previously scanned, a result of the previous scan is used to decide whether or not the file violates the data loss prevention policy. If the file was not previously scanned, the file is scanned to decide whether or not the file violates the data loss prevention policy.
Abstract:
Disclosed herein are a method and a system for data management. An administrator can configure data access permissions for each user to each file and file folders the user is attributed to. Further, when a user requests data access the system checks whether the user has permission to access that particular file/file folder. If the user is found to have permission to access that particular file/file folder, the system allows the user to access the file/file folder user with permitted read and edit settings. If the user is found to have no access to the requested file/file folder, then the system denies access to the user.
Abstract:
Disclosed herein are a method and a system for discrete data containerization for Information Rights Management. The system identifies based on a user request, data to be containerized. Further, the system receives at least one rule based on the data and attributes, which is to be used for containerizing the data. Further, using the rule, the system containerizes the data, wherein the data is containerized at individual data level.