A start-up company wants to implement an Information Rights Management (IRM) solution to control access to sensitive corporate documents. The company wants to ensure that files remain protected even when shared externally. Which of the following is the LEAST likely solution for enforcing IRM policies?