For example, as the security policy to prevent the information leak, unauthorized access or the like, there are a use permitted, operation authority and the like, which are specified in the policy information and set on the document to restrict the operation of the document.