S 4.99 Protection against subsequent change to information

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: User, Administrator

Files disclosed to third parties may generally also be processed further by those third parties. This is not always what was originally intended. Therefore, protection against subsequent changes, extract disclosure, or processing would be desirable.

Frequently, one faces the problem that information is made available for third parties via the internet or other networks, but this information is not intended to be printed out a hundred times or integrated seamlessly into other work.

There are various solutions to this problem, and some of these solutions can be combined. Examples of this include:

Many application programs offer security mechanisms in order to restrict the further handling of created files. In the following, some of these security mechanisms are presented using PDF files as an example. Since the security mechanisms of the different application programs are defined differently and sometimes even vary between two versions, it is important to provide the employees with information as to how these must be used and which steps must be taken into consideration before disclosing electronic documents. Frequently, it makes sense to thoroughly train one employee (plus substitute) regarding this. This employee should then process all documents to be disclosed in accordance with the security provisions or be available as contact person.

Protection of PDF documents

PDF documents can be equipped with access restrictions when they are created. For example, opening, printing, or copying PDF files may be restricted.

The metadata a file shall contain should be considered carefully. For example, it may be required to include numerous metadata in a file so that the file can be found using search engines. However, it may also make sense to not disclose any metadata, for example the name of the author should be removed if a document is to be disclosed anonymously.

Unfortunately, this only provides rudimentary protection, because PDF files (regardless of the program version used for their creation) can also be opened using programs which ignore these security attributes. For example, as long as printing is allowed, the document can be converted back into a PDF file without any restrictions at any time.

Review questions: