In this chapter, you’ve learned about the many different and potentially confusing kinds of document protection and security available in Word. You should now have a good idea about which forms of protection and security are useful and which ones give only a false sense of security. You’ve also learned about tracking changes and commenting on Word documents. You should now be able to do the following:
Use Information Rights Management to set strong protection for Word documents
Use Word’s legacy password protection, while understanding that it’s feeble protection at best