Information rights management technology should be used and applied (when applicable) to all sensitive data. This technology can add a security layer that will help protect files from unauthorized copying, viewing, printing, forwarding, deleting, and editing.
Define and implement, processes, procedures and technical measures to protect sensitive data throughout it's lifecycle.