Information Rights Management (IRM) helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. The permissions are stored in the document, workbook, presentation, or e-mail message, where they are authenticated by an IRM server.
To view rights-managed content that you have permissions to by using Microsoft 365, just open the document, workbook, or presentation.
The first time that you open a document, workbook, or presentation with restricted permission, you'll connect to a licensing server to verify your credentials and to download a use license.
If you want to view the permissions you have, either click View Permission in the Message Bar or click one of the following in the status bar at the bottom of the screen:
-
This document contains a permissions policy
-
This workbook contains a permissions policy
-
This presentation contains a permissions policy
-
Open the document that has restricted permissions.
-
If this is the first time that you are accessing the licensing server, enter your user name and password for the licensing server, and then select the Save password in Mac OS keychain check box.
Tip: If you do not select the Save password in Mac OS keychain check box, you might have to enter your user name and password multiple times.
-
The Message Bar appears and displays a message that the document is rights-managed. On the Message Bar, click View Permissions.
Note: If you have Full Control permission, the Message Bar displays Change Permissions.
-
Under Permissions, view the list of tasks that you can perform with the file. Under Restrictions, view the list of tasks that you cannot perform with the file.
Information Rights Management (IRM) helps do the following:
-
Prevent an authorized recipient of restricted content from forwarding, copying, changing, printing, faxing, or pasting the content for unauthorized use
-
Restrict content wherever it is sent
-
Provide file expiration so that content in documents can no longer be viewed after a specified time
-
Enforce corporate policies that govern the use and dissemination of content within the company
IRM can't prevent restricted content from being:
-
Erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain kinds of spyware
-
Lost or corrupted because of the actions of computer viruses
-
Hand-copied or retyped from a display on a recipient's screen
-
Digitally photographed (when displayed on a screen) by a recipient
-
Copied by using third-party screen-capture programs