Diff Share Infographic
Transcription
Diff Share Infographic
WHAT ARE SELF-PROTECTING DATA AND DIFFERENTIAL SHARING? Bob opens Alice’s document. He has permission to view the SENSITIVE content. Bob copies selections of the document and pastes them into an email. blah, blah, blah blah, blah, blah blah, blah, blah DON’T TELL ANYONE DON’T TELL ANYONE ABOUT THIS PART blah, blah, blah ALICE blah, blah, blah BOB Alice creates a document with both SENSITIVE and NON-SENSITIVE information. She classifies and protects the SENSITIVE information. blah, blah, blah blah, blah, blah DON’T TELL ANYONE DON’T TELL ANYONE Kellie does not have permission to view the SENSITIVE content. Therefore it remains redacted. blah, blah, blah DON’T TELL ANYONE KELLIE RICK Rick received the email and does have permission to view the SENSITIVE content. Kellie pastes the content into a database. She still can move SENSITIVE content but it is NEVER revealed to her unless she has permission. asdflk adlfkadf asdlfkj asdflk adlfkadf asdlfkj RON Ron generates a report from the database. This report pulls both the SENSITIVE and NON-SENSITIVE information. However, Ron has permission to view the content. blah, blah, blah DON’T TELL ANYONE asdflk adlfkadf asdlfkj asdflk adlfkadf asdlfkj It is important to note that the information still contains the original protection and encryption that Alice first set into place. WindTalkerSecurity.com SET YOUR DATA FREE