RDocs™ offers various ways to control document access, allowing you to customize its security measures. When generating or sending an RPD, you can manage file-embedded security controls in the following panels:
Access Control
Access control allows you to select the level of security required to access a document, based on the specific use case.
- Track views: allows you to assess the popularity of a document by tracking the number of views by reader IP.
Full capabilities include:
. Opening times recorded: Records the opening times for each reader
. Geo-location: Records the geo-location for each activity with the RPD™
. Reader IP recorded: Records the IP address associated to each activity
. Restrict access by IP: Provides the option to restrict access to the RPD™ to a range of IP addresses
. Watermark: Provides the option to add a watermark to the RPD™
- Track readers: This option provides all the controls and insights of the first level of security plus it records views both by IP and by email address, which enables you to build lists of readers (for example, for marketing purposes).
Full capabilities include all the controls and insights of the first level of security plus the ones below:
. Authorization with verification code required: Protects the RPD™ with an access code
. Reader email addresses recorded: Records the email address associated to each activity with the RPD™
. Restrict access by domain: Restricts access to specific email domains
. Times read per reader: Records the number of reads per reader
. Time spent reading per reader: Records the total read time for each reader
. Limit number of reads per reader: Provides the option to set a maximum number of reads per reader, after which the RPD™ will automatically expire for that reader
. Voting/Vote sharing: Provides the option to allow readers to vote/display each readers’ votes to the rest of the authorized readers
. Notification of reading: Provides the option for you to receive a notification for each access to the RPD™.
- Limit readers: This option provides all the controls and insights of the first two levels of security plus the ability to restrict access to a list of pre-authorized readers. Regardless of whether the RPD™ file is forwarded, unauthorized viewers will not be able to access the content of the file and, instead, will be prompted with the following message: “This document has restricted distribution”. Two-factor authentication ensures the reader associated with their email address is in fact who the originator has authorized to access the RPD™ file.
Full capabilities include all the controls and insights of the first two levels of security plus the ones below:
. Restrict viewing of the document to a registered viewer or list of authorized viewers.
. Restrict forwarding of the RPD™.
. Make changes to the list of authorized readers after the send.
Real-time interactivity
Depending on the security level selected, specific features in the Real-time Interactivity panel will be available.
. SideNote: Allows you to include a note for additional context, instructions, or comments. This note will be displayed in the reader interface when clicking on the message icon in the top right corner.
. Allow responses to: Allows you to set a reply-to email address different from your own. Readers can send a reply directly from the reader interface.
. Proof of sending: When enabled, you will receive confirmation via email that the document has been successfully shared.
. Display distribution list: When enabled, it allows readers to see the list of authorized readers.
. Voting: When enabled, it provides the option for readers to vote (like or dislike) within the RPD™.
. Share votes: When enabled, it displays each readers’ votes to the rest of the authorized readers.
. Notification of reading: When enabled, you will receive a notification for each access to their protected document.
. Email verification code: When enabled , this sends an access code to each authorized reader.
Location protection
With RDocs™, you can opt to limit access to an RPD™ by geographic or internet location. Navigate the interactive map or enter the approved IP range in CIDR format manually to control exactly by whom and where your documents can be accessed from.
CIDR (Classless Inter-Domain Routing) is a method of assigning Internet Protocol (IP) addresses. Document originators can restrict access to their documents to certain CIDR lists.
Content protection
Depending on the chosen Access Control option, specific features in the Content Protection panel will be enabled. You may apply additional advanced content protections to the document.
Capabilities include:
. Scheduling document availability: You must set the date from when the RPD™ can be accessed by readers and an expiration date. Note: If you wish to have the ability to set the exact launch and expiration times for the RPD, please reach out to your Customer Success representative to enable this option on your account.
. Restrict to domains: Access to the document is limited exclusively to readers within these domains.
. Watermark: Imprints a watermark onto the document. You can create your own watermark and add it to the document by selecting the option MyLogo inside the watermark options.
. Max read per reader: Allows you to set the maximum number of reads per reader before the RPD™ automatically expires for that reader.
. Identify leakers: When enabled, this feature embeds each reader's email address as a dynamic watermark on the document. This makes it easy to identify the source of any unauthorized content distribution. By having their email address visible across the document, users are discouraged from taking pictures and leaking the content, as it can be easily traced back to them.
. Timestamping: When enabled, a timestamp is added inside the RPD™ with the time sent.
. Can print: When enabled, the reader will be able to print the RPD™.
To learn how to control the RPD after it has been sent or generated, click here to access the available features in the Manage tab.