{"id":28,"date":"2020-06-30T19:20:10","date_gmt":"2020-06-30T10:20:10","guid":{"rendered":"https:\/\/www.dataclasys.com\/feature\/strict-security\/"},"modified":"2020-12-16T17:50:51","modified_gmt":"2020-12-16T08:50:51","slug":"security","status":"publish","type":"feature","link":"https:\/\/www.dataclasys.com\/feature\/security\/","title":{"rendered":"\u53b3\u5bc6\u3067\u67d4\u8edf\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6027\u80fd"},"content":{"rendered":"\n
DataClasys\u306fDRM\/IRM\u6280\u8853\u3092\u5229\u7528\u3057\u305f\u6697\u53f7\u5316\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3068\u3057\u3066\u3001\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u304b\u3089\u6a5f\u5bc6\u60c5\u5831\u306e\u6d41\u51fa\u3092\u9632\u304e\u307e\u3059\u3002\u4e00\u5ea6\u6697\u53f7\u5316\u3057\u305f\u30d5\u30a1\u30a4\u30eb\u306f\u5e38\u6642\u6697\u53f7\u5316\u72b6\u614b\u3092\u7dad\u6301\u3059\u308b\u305f\u3081\u3001\u5e73\u6587\u30d5\u30a1\u30a4\u30eb\u304c\u6d41\u51fa\u3059\u308b\u9699\u3092\u4f5c\u3089\u305a\u9ad8\u3044\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u78ba\u4fdd\u3057\u307e\u3059\u3002\u307e\u305f\u7d44\u7e54\u306e\u5b9a\u3081\u305f\u30dd\u30ea\u30b7\u30fc\u306b\u5408\u308f\u305b\u305f\u67d4\u8edf\u306a\u6a29\u9650\u7ba1\u7406\u3092\u53ef\u80fd\u3068\u3059\u308b\u3068\u3053\u308d\u3082DataClasys\u306e\u5927\u304d\u306a\u7279\u9577\u3068\u8a00\u3048\u307e\u3059\u3002<\/p>\n\n\n\n