摘要 |
PROBLEM TO BE SOLVED: To not only detect a leakage destination of information, but also prevent further leakage of information, and remotely remove the information leaked in an ex-post manner.SOLUTION: An active trace management server 3 generates a container which includes: an encrypted content; a policy on prevention of secondary distribution for performing access control by using a function of an auxiliary application; trace information; and a monitoring application for giving control to the auxiliary application when the auxiliary application is operating in a terminal, and finishing a container without developing it without the auxiliary application, and which is a self-execution type file also having a function of being processed to the container again after completion of processing. An active trace server 1 receives the trace information from the auxiliary application, and browses and retrieves the use state and copy state of the content in response to a demand. |