 |   | FAQ | Question | |
41 |
 | Advanced Settings |
| |
12 |
|  |
1 |
 | Comparison |
| |
43 |
|  |
63 |
 | Curtain Client |
| |
5 |
|  |
17 |
 | Curtain LogTrace |
| |
20 |
|  |
16 |
 | Curtain Server Plug-in |
| |
15 |
|  |
| | 00060 | Any survey about data security? |  |
 |  | 00030 | An employee is going to leave the company. How to stop this employee to access sensitive documents? |  |
| | 00028 | Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)? |  |
 |  | 00012 | Can users change file extension in Protected Zone? Does it cause data leakage? |  |
| | 00019 | Can users steal information by attaching local hard-disk to another PC? |  |
 |  | 00034 | Can workstations without Curtain Client access Protected server resource (e.g. Protected share folder)? |  |
| | 00013 | How does Curtain e-locker handle Copy and Paste? |  |
 |  | 00045 | How does Curtain e-locker handle Insert Object and other similar functions? |  |
| | 00076 | How does Curtain e-locker handle Print-screen? |  |
 |  | 00077 | How does Curtain e-locker handle Print-to-PDF? |  |
| | 00029 | How to uninstall Curtain e-locker system in the future? any procedures or guidelines? |  |
 |  | 00033 | If Curtain Client cannot connect to Curtain Admin (due to network problem or failure of Curtain Admin), does it affect normal usage of sensitive information? does it cause data leakage? |  |
| | 00044 | If Curtain related services are stopped by users, what does it happen? |  |
 |  | 00017 | Where does Curtain e-locker do encryption? |  |
| | 00022 | Will data in Protected Zone be leaked to the public through Peer-to-Peer (P2P) software (such as Foxy or BT)? |  |
3 |
|  |
5 |
 | Definitions |
| |
6 |
|  |
10 |
 | Feature - Audit Trail |
| |
6 |
|  |