① document: document encryption, encryption can be. the encrypted document of illegal handling, and prevent information leakage. ②, user / group): the right of reading and editing and other privileges can be configured according to the user / group. the effect and the use of the information and the access / change group). ③, read the document, the document number, the configuration: the configuration, to prevent improper use.in addition the number of read times, configuration, rather than through strong security function to perform. ④ mi, copy paste the content restrictions: document the radiation mi paste is prevention. ⑤ screen, set limit to the screen printing screen keys set up: the use of the tool through the cap to prevent the outflow of information. ⑥ printing: printing, marking his name, department, name of the computer.the output of the print time, print the marking insert is provided through the print function, prevent information leakage. ⑦ automatically replace the file, and read: number of times more, the output file will be automatically deleted. deleted file recovery software to restore, but was unable to ⑧ security audit: user login / logout.the document encryption to create / edit / replace / remove / output and behavior and the management of the security policy and the change of behavior of the manager is to create security for the can.
번역되고, 잠시 기다려주십시오..
