The perils of Metadata in documents



Loose lips sink ships, so the old saying goes. These days documents are emailed back and forth and many times, revisions are made to “polite the text” up or “sanitize” or “redact sensitive information”. With many file formats though, the metadata about the revisions (or even the old versions of the data itself) are still there. The Security Fix has a great article on the topic today.


I remember a story several years ago about businesses being burned by revision changes that still existed in the Word document that was mailed out. (Application letters that had been changed for several employers/position availabilities with salary info/interoffice memos with poorly chosen comments about coworkers/bosses and even security breaches of sensitive information.)

What to do???? Brian gives some good links to Adobe’s site and information on finding metadata in pdf documents, Microsofts how-to find and remove meta-data for Microsoft Office documents, Harlan Carvey’s site on locating metadata in Windows and online (this link not currently working?) and a good freeware find…. Trace which is for finding documents with metadata online on an intranet, or on your pc. Like I said, this last one looks like a great piece of freeware.

It looks like the above are good reads for people that work with getting documents out to the public, or work in an organization that sends documents out to the world.

Related Posts

Blog Traffic Exchange Related Posts
  • Beware: Wolves in sheeps clothing found on different sites (security scams) This is another "wolf in sheeps clothing" alert. The Sunbelt blog has information and tips on a number of other sites that are posing as either the Windows security center page, or a page not found error. The windows security center spoof once again claims the following "Attention! Your system......
  • Green AV Remove | Remove Green Antivirus 2009 I'm seeing a lot of searches for how to remove the rogue antivirus green AV. It looks like it's the latest flavor of the minute in the rogue security application crowd. My usual path for removing a rogue antivirus or antispyware application is the same as any other malware, try......
  • How embarrasing... Computer security firms database hacked The Washington Times, has a story from Brian Krebs of their Security Fix blog about ... Guidance Software -- the leading provider of software used to diagnose hacker break-ins -- has itself been hacked, resulting in the exposure of financial and personal data connected to thousands of law enforcement officials......
Blog Traffic Exchange Related Websites
  • Article Marketing Benefits And Advantages When you've been at article marketing for a while, it can really amaze you to see just how many programs, courses and ebooks are being sold to teach how to generate traffic. Thousands of dollars are spent on these products year after year, but the people who buy them hardly......
  • Web Site Design And System: Staking The Island Inside An Sea Of Data If it were that easy then a internet is sure to have a great deal more websites up now than it already does. The strategy for one's website ought to be approached much being a chess game. Know how to position your pieces in a way to attain maximum benefit.......
  • Keep Those Spammers Out With .htaccess File Spammers possess a skill for creating overrides for you to even probably the most guaranteed aspect of the system such as these which are not readily acknowledged as potential locates. The .htaccess file can be used to preserve e-mail harvesters away. That is considered extremely successful since all of these......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site