In the evolving landscape of data security within cloud environments, Information Rights Management (IRM) introduces capabilities not typically encompassed by conventional security measures. Which of these capabilities uniquely distinguishes IRM in terms of data control?