This article is part of a series discussing my experiences fine-tuning IRM policies. To start from the beginning, check out part 1. Part 1 Part 2 Part 3 Priority user groups (PUGs) Virtually every organization has one or more groups of employees who have an elevated level of access to sensitive information and associated risk […]