In six pages this paper discusses how digital information is vulnerable to regarding threats to private information. Four sources are citd in the bibliography.