Word 2010 tips: How to protect your Word 2010 document
This tips to help you how to protect your Word 2010 document, following these steps:
- In an open document, click the File tab. The Backstage view opens.
- In the Backstage view, click Info.
- In Permissions, click Protect Document. Then select:
– Mark as Final: Make the document read-only
When a document is marked as final, typing, editing commands, and proofing marks are disabled or turned off and the document becomes read-only. The Mark as Final command helps you communicate that you are sharing a completed version of a document. It also helps prevent reviewers or readers from making inadvertent changes to the document.
– Encrypt with Password: Set a password for the document
When you select Encrypt with Password, the Encrypt Document dialog appears. In the Password box, type a password. Important: Microsoft cannot retrieve lost or forgotten passwords, so keep a list of your passwords and corresponding file names in a safe place.
– Restrict Editing: Control what types of changes can be made to the document
When you select Restrict Editing three options appear: Formatting restrictions: this reduces formatting options, preserving a look and feel. Click Settings to select which style are allowed. Editing restrictions: you control how the file can be edited or you can disable editing. ClickExceptions or More users to control those who can edit. Start enforcement – Click Yes, Start Enforcing Protection to select password protection or user authentication. In addition, you can click Restrict permission to add or remove editors who will have restricted permissions.
– Restrict Permission by People: Use a Windows Live ID to restrict permissions
Use a Windows Live ID or a Microsoft Windows account to restrict permissions. You can apply permissions via a template that is used by your organization, or you can add permissions by clicking Restrict Access.
– Add a Digital Signature: Add a visible or invisible digital signature
Digital signatures authenticate digital information such as documents, e-mail messages, and macros by using computer cryptography. Digital signatures are created by typing a signature or by using an image of a signature to establish authenticity, integrity, and non-repudiation. See the link at the end of this topic to learn more about digital signatures.