Hey, who stole my IP address?
” 4. “If it’s not required by law, it’s not in my job description…” 5. “How did your virus get in my video?” 6. “Keep your hands off my files.” 7. “Spam me baby one more time.” 8. “Can we implant RFID chips in all of our employees?” 9. “Please leave your cell phone, Blackberry, digital camera USB-key, voice recorder and any other digital device at the security desk!” “Give me back my data!” According to the Privacy Rights Clearinghouse, more than 100 million records with sensitive information have been affected by data breaches since early 2005. These incidents will continue to increase as companies are forced to make them public knowledge. Corporations will need to implement programs for data protection in addition to computer asset recovery. Often the information stored on stolen or lost computers is more valuable than the device itself. In addition, fear of liability, penalties or other negative repercussions will drive data recovery or remote data deletion technologies to mitigat