This 3 page paper examines how one individual has decided to protect personal data on his computer. Bibliography lists 3 sources.