Back to Blog

15 Ways to Protect Data with Digital Security Watermarks

by | Mar 24, 2022

Everyday business documents continue to be one of the biggest sources of data leakage. The Facebook leaks and WikiLeaks are prime examples of the damage such breaches can wreak. Even with the best security tools in place users seem to always be able to find a way to circumvent security. Or, as in most cases, accidentally share data with the wrong audience creating a security issue. Digital security watermarks provide a simple solution to warn users about the sensitivity and intended audience of a document to prevent mishaps. And, when all else fails, they can be extremely helpful in tracking the source of a data leak.

What is a Digital Watermark?

Watermarks have come a long way from rubber stamping or adding the words ‘confidential’ or ‘draft’ in grayscale across a document via a word processor. Today’s digital watermarks embed important data into a document to track it’s point of origin and/or its owner using details about the user, time / date of access, machine it was accessed on, etc. They act as a digital thumbprint that travels with the document.

Why Should You Use Watermarks?

Applying digital security watermarks to sensitive documents can help prevent data loss, misuse and unauthorized sharing in a variety of ways. They can be used to augment data security practices to:

  • Provide users with a visual reminder that they are handling sensitive information.
  • Supplement user education and training relating to the safe handling of sensitive or proprietary information.
  • Deter users from stealing documents or from taking a picture with their mobile device.
  • Track document chain of custody in the event of a leak.
  • Provide read-only access by displaying the watermarked document in a secure reader that disables, print, copy and sharing capabilities.

What Types of Documents Should You Watermark?

Any document that contains sensitive data that you need to control or restrict access to is a good candidate for watermarking. Common types of data you should think about watermarking include:

  • Intellectual property (IP)
  • Manufacturing plans
  • Product specs and designs
  • Financial documents
  • M&A documents
  • Human Resources (HR) documents
  • Healthcare Information
  • Legal contracts
  • Regulated Data (PII, PHI, CUI, FCI, etc.)
  • Classified Information

15 Practical Uses for Digital Security Watermarks

The potential uses for watermarks are endless and can vary accordingly to an organization’s individual needs, the type of data that your organization manages, your industry and any associated regulatory requirements. Here’s a few applications of digital security watermarks in enterprise as well as public sector scenarios.

Enterprise Use Cases

  1. Sharing previews of upcoming products with partners not meant for public distribution. For example, the release of a new toy or a script.
  2. Sharing and/or collaboration of IP and trade secrets with internal stakeholders and/or partners.
  3. Protecting HR documents that contain PII, salary or disciplinary information.
  4. Protecting documents laying on a printer in a public space – just think of all those unclaimed documents lying on the public office printer.
  5. Sharing sensitive documents with third parties.
  6. Protecting images or information posted online.
  7. Clearly identifying that information has additional specific handling instructions, for example “PROJECT X STAFF ONLY” or “UNCONTROLLED IF PRINTED”
  8. Automatically applying relevant information such as the related industry, client, project or any other relevant document details.
  9. Applying disclaimers. For example, ‘Document intended for Client X only, any use outside this purpose is not authorized’.
  10. Marking the current document status (Working / Draft / Final / Approved / Released) as well as recent history / current version + timestamp of a document. For example, ‘This version is approved for public release by Person X’.
  11. Aid in forensic tracking if a screen shot/photo is taken of sensitive information to track the leak source.
  12. Tracking the source of a leaked document – whether accidentally or deliberately shared with an unauthorized audience.

Public Sector Use Cases

In addition to the use cases above there are many specific use cases for Government, Defense and the Defense supply chain, including, but not limited to:

  1. Proper tagging of Freedom of Information Act (FOIA) Documents when the data is publicly released.
  2. Secure sharing of tactical information for military units (such as OP Orders, travel documents, etc.).
  3. Properly tagging Controlled Unclassified Information (CUI) in accordance with requirements.

Digital Security Watermarks from archTIS

Manually applying watermarks is prone to human error, for example, if a user forgets the step entirely or marks the data wrong. What if you could automatically ensure documents were watermarked properly?

archTIS solutions dynamically apply digital security watermarks that can contain user, environmental and data attributes. Digitally stamp documents with any combination of attributes such as: user name, IP address, date/time, document sensitivity, intended audience, etc. according to simple configurable rules to meet individual requirements. Users can share and edit watermarked document contents – but cannot edit or remove the watermark itself.

For further protection, watermarked documents can be displayed in a secure in-app viewer that ensures read-only access, disabling functions such as print, edit, copy and save as. This ensures your most sensitive documents can’t be changed, downloaded or shared. You can also track access to the document.

archTIS’ Digital Security Watermarks can be dynamically applied to the following common file types:

  • Microsoft Office documents: (.txt, .csv, .doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Images: (png, .jpg, .jpeg, .tif, .tiff, .bmp)
  • CAD files (dgn, .dwf, .dwfx, .dwg, .dwt, .dxf, .ifc, .iges, .plt, .stl, .cff2)
  • PDF documents

Above: Dynamically apply digital security watermarks and enforce read-only access to prevent, copy, paste, edit or save as capabilities with NC Protect and Kojensi.

Want to Add Watermarks to Your Security Toolbox? Contact Us.

Dynamic security watermarks add an addition layer of protection to safeguard confidential data and avoid compliance issues. If you could benefit from watermarking sensitive information in your Microsoft 365 collaboration applications or need a document management platform for secure sharing of classified information, contact us today.

Share This