Published
Read time6 min
Listen to this article

The CMO's Complete Guide to Document Access Control: Permissions, Expiry & Revocation

Firma Editorial

Document Security Expert

TL;DR

Access control for marketing documents means three things — setting the right permission level at creation, setting an expiry date at delivery, and having a reliable revocation process at engagement close. Most CMOs do the first inconsistently and skip the other two entirely.

The CMO's Complete Guide to Document Access Control: Permissions, Expiry & Revocation

The CMO's Complete Guide to Document Access Control

Document access control is one of those topics that feels technical until you've experienced a document reaching someone it shouldn't, or a former client accessing work from an engagement you thought was closed six months ago. Then it becomes very practical very quickly.

For CMOs — especially fractional CMOs managing multiple concurrent engagements — access control isn't a nice-to-have. It's the foundation of professional document delivery.

What Is Document Access Control?

Document access control is the set of decisions that determine who can access a document, what they can do with it, and for how long. It has three components:

Permission level — What the recipient can do: view only, comment, edit, download, share.

Access scope — Who specifically can access: a named individual, anyone with the link, a specific team, the public.

Time boundary — How long the access is valid: indefinitely (the default), until a specific date, or until explicitly revoked.

Most document sharing decisions address the first two and ignore the third entirely. This is the root cause of zombie links, IP leakage, and the "former client can still see everything" problem.

Why CMOs Have Special Access Control Needs

A fractional CMO faces a specific access control challenge: they're delivering highly sensitive strategic work to multiple clients simultaneously, with different sensitivity levels across different documents, and engagements that start and end on an ongoing basis.

This creates a matrix of access control requirements:

  • Some documents should be client-accessible for the duration of an engagement
  • Some documents should be client-accessible temporarily (a strategic framework you share for a specific decision, then want back)
  • Some documents should never be client-accessible (your internal methodology, your reusable templates, your cross-client benchmarks)
  • All access should end cleanly when the engagement ends

Achieving this through ad-hoc Google Drive sharing is difficult. Achieving it through a managed portal with built-in access control is straightforward.

Permission Levels: Choosing the Right One

PermissionUse caseRisk if too broad
View onlyClient-facing deliverables, strategy documentsLower risk — client can see but not edit
CommentCollaborative working documents during engagementComments visible to all collaborators
EditInternal team collaboration onlyClient edits can corrupt deliverables
DownloadReports the client needs locallyDownloaded copy is uncontrolled forever
ShareNever appropriate for client-facing documentsCreates entirely new access paths you can't control

Default recommendation for client-facing documents: View only, no download. If the client needs a local copy, create a specific export event (dated, versioned) rather than granting ongoing download access.

Setting Expiry Dates: The Underused Tool

Every document shared with a client should have an expiry date. For most engagements, this means:

  • Routine deliverables: Expire when the engagement ends (set at the start of the engagement based on the expected end date, adjustable as needed)
  • Time-sensitive documents: Expire within a defined window (e.g., a pricing proposal expires in 14 days)
  • Highly sensitive materials: Expire as soon as they've served their specific purpose (e.g., a confidential competitive analysis shared for a specific decision meeting)

This is what Firma calls "time-bomb sharing" — setting a document to self-destruct at a specific date or trigger. It's the technical implementation of the intent you already have but probably never enforce.

Revocation: The Engagement Close Imperative

The most important access control action is the one that happens last: revoking all access when the engagement ends.

This requires a process — not just a good intention. The process should include:

  1. A checklist of all documents shared during the engagement
  2. A revocation step for each one (or a single portal-level revocation if using a managed tool)
  3. A confirmation that no access points remain
  4. An archive copy of the engagement in read-only format for your own reference

Firma's "Wrap" feature executes this in one action: the client portal converts to view-only or closed, all active sharing permissions are revoked, and the engagement moves to archived status.

Building Access Control Into Your Workflow

Access control should not be a separate exercise — it should be embedded into your document workflow at three natural points:

At document creation: Decide (and record) who should have access, at what level, and for how long.

At delivery: Configure the access accordingly. If using a portal, ensure the document is in the right section with the right permissions.

At engagement close: Execute the revocation checklist. Verify no access remains.

The discipline of treating access control as a workflow step rather than an afterthought is what separates CMOs who never have document security incidents from those who discover problems months after they happened.


Frequently Asked Questions

What is the best way for a fractional CMO to manage document access across multiple clients?

Use a dedicated client portal per engagement, set access expiry dates on all sensitive documents at the time of delivery, and execute a documented revocation checklist at engagement close. This creates a reliable, repeatable process that doesn't rely on memory.

How do you revoke document access when a client engagement ends?

If you use a client portal like Firma, engagement close is a one-click action that revokes all portal access. For Google Drive-only sharing, you need to manually review all files and folders shared with the client and remove their access — or use Google Workspace Admin tools to audit and batch-revoke.

What permission level should CMOs give clients for strategic documents?

View-only is the safest default for client-facing strategic documents. It allows the client to read and use the content without being able to edit the source, add comments visible to others, or share onwards from within the document. If you need to collect client feedback, route it through a separate channel (a form, a meeting, or a comment layer in your portal) rather than by granting edit or comment access on the document itself.

access-controldocument-securitypermissionscmo-toolsip-protection