Microsoft Office Tutorials and References
In Depth Information
Securing Your Word Documents
ChAPTER 20
Securing Your Word Documents
Protection Features in Word 2010 . . . . . . . . . . . . . . . . . . 614
Working with Protected View . . . . . . . . . . . . . . . . . . . . . 615
Marking a File as Final . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
Encrypting Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
Applying Editing Restrictions . . . . . . . . . . . . . . . . . . . . . . 622
Removing Personal Information and Hidden Data . . . . 625
Preparing PDF and XPS Files. . . . . . . . . . . . . . . . . . . . . . . 626
Signing Your Documents with Digital Signatures
and Stamps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Working with the Trust Center . . . . . . . . . . . . . . . . . . . . . 633
Setting Permission Levels . . . . . . . . . . . . . . . . . . . . . . . . . 636
Checking Document Accessibility . . . . . . . . . . . . . . . . . . 638
Ensuring Document Compatibility . . . . . . . . . . . . . . . . . 639
What’s Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
T here are good reasons today to take file security seriously. Whether you work alone
in a home office or trade files and collaborate with colleagues all over the globe,
chances are that your documents bump up against security risks all the time. In
addition to the anti-virus program running on your computer, Word offers a number of features
that help you keep your information private, secure, and safeguarded.
In today’s world of always-on, connect-everywhere technology, it’s not unusual to be
working with teammates across the country while you’re sitting at a coffee shop, riding the
train, or checking e-mail on your phone. We trade so many files back and forth and we
think they go directly to the recipient and back again. But what if a file falls into the wrong
hands? Or what if someone hijacks your e-mail account? Microsoft Word 2010 can help
you to ensure that only the information you want to share is included in your document.
It also makes it easy for you to tailor permissions so you give only those people you want
to have access to your document the necessary permissions to work with your content. And
the new Protected View feature runs a series of background checks—invisible to you—on
a document before you even open it, helping you ensure that you aren’t putting your data
and your computer in harm’s way.
This chapter is all about the features with which Word 2010 can help you secure your
files. Most people know the importance of using security measures at the network level or
being careful to safeguard files they send as e-mail attachments or post to an online site,
but Word provides you with a number of tools you can use to protect your content at the
document level as well. For example, you might want to protect your document in the
following ways:
Control who can open, modify, distribute, and print your documents
Specify the types of changes others can make to your documents
Remove personal and hidden information
613
Search JabSto ::




Custom Search