{"id":2369,"date":"2014-02-26T00:00:00","date_gmt":"2014-02-25T23:00:00","guid":{"rendered":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/"},"modified":"2025-03-26T10:30:24","modified_gmt":"2025-03-26T09:30:24","slug":"preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm","status":"publish","type":"post","link":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/","title":{"rendered":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part I (IRM)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;]<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/e514990f-00f8-4484-ae8f-aa36fbfaaba9\" alt=\"C\u00f3mo evitar fugas de informaci\u00f3n sensible con la ayuda de Office 365 - Parte I (IRM)\" width=\"510\" height=\"250\" \/><\/p>\n<p><strong>Data leakage<\/strong> occurs when confidential or sensitive information of a company out of it by employees (deliberately or accidentally way).<\/p>\n<p><strong>Information<\/strong> (files and emails) is one of the <strong>most valuable assets<\/strong> for companies and its protection is one of their biggest concerns. For this reason Microsoft has incorporated into Office 365 <strong>Information Rights Management (IRM)<\/strong><\/p>\n<h2><span style=\"color: #001689;\"><strong>What is IRM?<\/strong><\/span><\/h2>\n<p>IRM is a tool that encrypts and protects sensitive information from unauthorized access. IRM helps your company to control who can access, forward, print or copy sensitive information via <strong>Exchange Online<\/strong> (e-mail) from <strong>SharePoint Online<\/strong> (documents) or just from other <strong>Office<\/strong> applications.<\/p>\n<p>Here are some <strong>options to protect access to information:<\/strong><\/p>\n<ul>\n<li>Protection against reading, copying and modification<\/li>\n<li>Protection against making screenshots<\/li>\n<li>Protection from printing documents<\/li>\n<li>Protection against downloading files<\/li>\n<li>Protection of sensitive emails<\/li>\n<li>Registration information access<\/li>\n<\/ul>\n<h2><span style=\"color: #001689;\"><strong>How IRM in Office 365?<\/strong><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/b8922df7-afef-4d5b-8b2b-1511bfd653f3\" alt=\"C\u00f3mo evitar fugas de informaci\u00f3n sensible con la ayuda de Office 365 - Parte I (IRM)\" width=\"260\" height=\"246\" \/><\/p>\n<p>IRM is available in the <strong>Office 365<\/strong> Plan <strong>E3<\/strong> and an optional subscription for other plans. Broadly speaking we can say that integration in Office 365 <strong>protects your confidential information, ensures continuous protection<\/strong> and <strong>improvement<\/strong> of <strong>the management<\/strong> and <strong>control of your information<\/strong><\/p>\n<p>These points are listed below IRM functionality that allows us to seamlessly with Office products 365. In the next post we will talk in depth about each of them:<\/p>\n<h3><span style=\"color: #0067fb;\"><strong>1- Protect important files from Office<\/strong><\/span><\/h3>\n<p>Authorized to restrict access to your most important files through Word, Excel and PowerPoint users is allowed. For example:<\/p>\n<ul>\n<li>Prevent <strong>people outside<\/strong> the company can open the document, although physically have.<\/li>\n<li>Avoid the possibility that <strong>employees<\/strong> of our organization to print, make a screenshot of a document, copy or modify it.<\/li>\n<li>Set <strong>expiration<\/strong> dates for a document, from which no one can reuse.<\/li>\n<\/ul>\n<h3><span style=\"color: #0067fb;\"><strong>2- Protecting emails sent to users of our organization<\/strong><\/span><\/h3>\n<p>Administrators can protect the output of information via email, preventing the contents from leaking outside the boundaries of the organization. For example:<\/p>\n<ul>\n<li>Prevent a recipient can perform some of these functions: forward, copy, modify, print, fax, print screen or cut and paste the contents of an email.<\/li>\n<li>Create rules for protection and automatic encryption for emails that meet certain conditions of business (sent by someone determined, someone determined, with certain texts, etc, etc).<\/li>\n<\/ul>\n<h3><span style=\"color: #0067fb;\"><strong>3- Send secure email to external users of our organization<\/strong><\/span><\/h3>\n<p>With IRM, you have the ability to send emails to users outside your company, encrypting and securing data that can only be read by the addressee.<\/p>\n<h3><span style=\"color: #0067fb;\"><strong>4- Protect documents stored in SharePoint<\/strong><\/span><\/h3>\n<p>IRM can be configured to automatically protect certain files stored in SharePoint libraries. When enabled, the files are encrypted so that only authorized people can view them or make them the predefined actions. For example:<\/p>\n<ul>\n<li>Prevent <strong>people outside<\/strong> the company can open the document, although physically have.<\/li>\n<li>Avoid the possibility that <strong>employees<\/strong> of our organization to print, make a screenshot of a document, copy or modify it.<\/li>\n<li>Limit the type of files that can be loaded in the library<\/li>\n<\/ul>\n<p>In conclusion, IRM allows greater control over the information, resulting in a protection so that it helps to prevent the leakage of knowledge. That is why it is highly recommended for use in companies that invest in innovation and \/ or have the need to protect sensitive files and e-mails.<\/p>\n<p>[\/vc_wp_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;] Data leakage occurs when confidential or sensitive information of a company out of it by employees (deliberately or accidentally way). Information (files and emails) is one of the most valuable assets for companies and its protection is one of their biggest concerns. For this reason Microsoft has incorporated into Office 365 Information Rights [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87],"tags":[],"categoria_posts":[],"class_list":["post-2369","post","type-post","status-publish","format-standard","hentry","category-modern-work-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preventing leaks of sensitive information with the help of Office 365<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preventing leaks of sensitive information with the help of Office 365\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;] Data leakage occurs when confidential or sensitive information of a company out of it by employees (deliberately or accidentally way). Information (files and emails) is one of the most valuable assets for companies and its protection is one of their biggest concerns. For this reason Microsoft has incorporated into Office 365 Information Rights [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/\" \/>\n<meta property=\"og:site_name\" content=\"Softeng\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-25T23:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-26T09:30:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/e514990f-00f8-4484-ae8f-aa36fbfaaba9\" \/>\n<meta name=\"author\" content=\"Daniel Navarro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/\"},\"author\":{\"name\":\"Daniel Navarro\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/person\\\/ed4f333f0a809c0610c9f7d9f224ff09\"},\"headline\":\"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part I (IRM)\",\"datePublished\":\"2014-02-25T23:00:00+00:00\",\"dateModified\":\"2025-03-26T09:30:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/\"},\"wordCount\":557,\"publisher\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/e514990f-00f8-4484-ae8f-aa36fbfaaba9\",\"articleSection\":[\"MODERN WORK\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/\",\"name\":\"Preventing leaks of sensitive information with the help of Office 365\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/e514990f-00f8-4484-ae8f-aa36fbfaaba9\",\"datePublished\":\"2014-02-25T23:00:00+00:00\",\"dateModified\":\"2025-03-26T09:30:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/e514990f-00f8-4484-ae8f-aa36fbfaaba9\",\"contentUrl\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/e514990f-00f8-4484-ae8f-aa36fbfaaba9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part I (IRM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\",\"name\":\"Softeng\",\"description\":\"Softeng | Maximize the cloud. Securely.\",\"publisher\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\",\"name\":\"Softeng\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logotipo-para-SEOYoast.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logotipo-para-SEOYoast.png\",\"width\":696,\"height\":696,\"caption\":\"Softeng\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/softeng\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@SoftengSL\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/person\\\/ed4f333f0a809c0610c9f7d9f224ff09\",\"name\":\"Daniel Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"caption\":\"Daniel Navarro\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preventing leaks of sensitive information with the help of Office 365","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Preventing leaks of sensitive information with the help of Office 365","og_description":"[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;] Data leakage occurs when confidential or sensitive information of a company out of it by employees (deliberately or accidentally way). Information (files and emails) is one of the most valuable assets for companies and its protection is one of their biggest concerns. For this reason Microsoft has incorporated into Office 365 Information Rights [&hellip;]","og_url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/","og_site_name":"Softeng","article_published_time":"2014-02-25T23:00:00+00:00","article_modified_time":"2025-03-26T09:30:24+00:00","og_image":[{"url":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/e514990f-00f8-4484-ae8f-aa36fbfaaba9","type":"","width":"","height":""}],"author":"Daniel Navarro","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daniel Navarro","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/#article","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/"},"author":{"name":"Daniel Navarro","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09"},"headline":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part I (IRM)","datePublished":"2014-02-25T23:00:00+00:00","dateModified":"2025-03-26T09:30:24+00:00","mainEntityOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/"},"wordCount":557,"publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/#primaryimage"},"thumbnailUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/e514990f-00f8-4484-ae8f-aa36fbfaaba9","articleSection":["MODERN WORK"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/","name":"Preventing leaks of sensitive information with the help of Office 365","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/#primaryimage"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/#primaryimage"},"thumbnailUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/e514990f-00f8-4484-ae8f-aa36fbfaaba9","datePublished":"2014-02-25T23:00:00+00:00","dateModified":"2025-03-26T09:30:24+00:00","breadcrumb":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/#primaryimage","url":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/e514990f-00f8-4484-ae8f-aa36fbfaaba9","contentUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/e514990f-00f8-4484-ae8f-aa36fbfaaba9"},{"@type":"BreadcrumbList","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-i-irm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/"},{"@type":"ListItem","position":2,"name":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part I (IRM)"}]},{"@type":"WebSite","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","name":"Softeng","description":"Softeng | Maximize the cloud. Securely.","publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization","name":"Softeng","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","contentUrl":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","width":696,"height":696,"caption":"Softeng"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/softeng\/","https:\/\/www.youtube.com\/@SoftengSL"]},{"@type":"Person","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09","name":"Daniel Navarro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","caption":"Daniel Navarro"}}]}},"_links":{"self":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/comments?post=2369"}],"version-history":[{"count":3,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2369\/revisions"}],"predecessor-version":[{"id":39494,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2369\/revisions\/39494"}],"wp:attachment":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/media?parent=2369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categories?post=2369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/tags?post=2369"},{"taxonomy":"categoria_posts","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categoria_posts?post=2369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}