With Rights Management and Identity Management combined, organizations can control which users/groups can access the data and what privileges (read, edit, share, etc.) the user can access when they access sensitive information.Read less