Comment Re:Microsoft Sharepoint (Score 1) 237
I work for a higher-end ECM vendor. This situation is one of many reasons to invest in ECM.
SharePoint does do some basic logging of who accesses a document, permits role-based access, and is quick to set up. The product I work on does much more, allows metadata-based security, and a hundred other things I won't plug here. Still, no ECM software I'm aware of solves the problem that once you permit content to be viewed, it can be sniffed, screencapped, saved as, copy-pasted, etc.
Maybe that isn't a requirement. Short of limiting physical access (which computer you allow people to view documents on) in ways that will cripple business use in creation and distribution, that is pretty hard to solve. Most of us not working in classified labs meet our legal(IANAL!) and business(IANAVP!) requirements by implementing suitable intrusion detection, by logging access to important content, by getting signatures on policies about data handling, journalling and archiving email, and applying share- and file-level security to prevent casual browsing. Will that prevent any misuse? No, but there is an audit trail there in terms of who accessed the document and what they sent in email.
Sometimes it is far more important to have a well-thought out, implemented, and DOCUMENTED strategy that can reassure a customer or partner. Show them that you have a good framework in place, and they will trust better that you know what you are doing. That may also be a good place for the organization to be if a legal discovery phase occurs.