Educating through instruction and visual cues
e-Safe Compliance educates the users right from the time they log into the PC, through instructions and visual cues. Instructions provide guidance on how to protect sensitive information, while visual cues are present during the creation, use and transfer of sensitive information.
e-Safe Compliance has a built-in Rights Management module, through which sensitive files are encrypted using ‘Universal Encryption’ and restrictions are placed on the use of information contained within the files. Universal Encryption has been specifically designed to target the authorised users. Universal Encryption offers the following advantages:
- The encryption is easy to use as it is transparent and automatically applied. Authorised users do not need to enter any passwords or apply any certificate to access the documents.
- The encrypted document can only be accessed on PCs having e-Safe agent installed with the relevant permissions.
- Documents remain securely protected during any transfer processes. As such, an organisation can allow the use of the any transfer mechanism such as Dropbox, Gdrive, syncing with phones, Skype, Gmail, etc.
Universal Encryption implements visual cues. Icon overlays of different colours are placed on top of files to represent different usage restrictions based on their sensitivity. For example, red-tagged documents are read-only, whereas amber-tagged documents are editable but only if a reason is provided. (These visual cues not only guide users as to the restrictions imposed, but also remind them that the information in the files is sensitive and needs to be handled with care.)
In addition to usage controls, e-Safe Compliance also applies access controls to files to prevent unauthorised access of the information within the organisation. If a file is inaccessible to a user, then a lock icon is shown on top of the file.