As Internet is now an important communication interface among people, many companies now use Internet to communicate. With every electronic devices going for mobility, data files are easily transferred to another media. However, unseen management leaks are also hidden behind these convenience. Companies are often unable to control or prevent employees actions such as transferring vital data to outside which may lead to company damages. DCI's product, EZ-Lock DRM (Digital Rights Management), uses advanced AES Algorithm Standard (256 bits) to automatically produce an encryption key. Through lower encryption driver, the program can transparently encrypt all files in the computer. If a file is stolen, it becomes unreadable and wasted as the encryption rendered the file useless in an unprotected environment. Most encryption products require the user to manually encrypt/decrypt files and save to committed folders. It is troublesome and unsafe! Our product adopts transparent encryption technology to directly encrypt/decrypt files; you can save them into any folder. Even unsaved temporary files are encrypted immediately. For example, when the client program is successfully installed into the computer and after you've edit a new file by notepad, you do not find yourself encrypting the file (You've done it TRANSPARENTLY!). When they are copied into USB Disk and moved into another computer (that is not in the protected environment), however, they become unreadable and unable to be edited. Such is the program's convenience! When encrypted files are transferred to another user, he will not be able to open the files if his computer is not licensed by EZ-Lock. The decrypted key must be obtained from the server. The key disappears when client computers are turned off. Even if the hard disk or computer is stolen, The files in the hard disk will not be cracked because the key is stored in the server. It is impossible for a user to crack the files encrypted by AES Algorithm (256 bits). Different hierarchical authorities are set with different policies when the server and client programs are installed. These groups are given different privileges according to the encryption key given by the server or the administrator (administrator can set the encryption keys manually or the keys can be server generated). For example, head of department has all the encryption keys, and he wishes to look at group A and B's documents. As he has all the keys, he is allowed view the actual information inside the documents. On the other hand, however, if any member of group B wants to view group A's files, all they will see is gibberish or they simply cannot open the file. As some of the vital information needs to be passed onto outsiders, there can be many different rules to which the information may be given to them without compromising the information's security. EZ-Lock has many tools to that make it a very humanized information security product. Potential partners/buyers are welcome to try out our 10 day trial software to gain a better understanding of the software. If there are any difficulties, you may contact us for a video conference demonstration and we can help you directly using remote access software.