Techniques for dynamically altering security criteria used in a file
security system are disclosed. The security criteria pertains to keys (or
ciphers) used by the file security system to encrypt electronic files to
be secured or to decrypt electronic files already secured. The security
criteria can, among other things, include keys that are required to gain
access to electronic files. Here, the keys can be changed automatically
as electronic files transition between different states of a
process-driven security policy. The dynamic alteration of security
criteria enhances the flexibility and robustness of the security system.
In other words, access restrictions on electronic files can be dependent
on the state of the process-driven security policy.