In today’s world, we rely on computer technology whether in fixed locations, like a workstation desktop computer, or when using mobile devices such as laptops, tablets, smartphones, or other personal digital assistants (PDAs). All require protections if they are used to store or transmit confidential information.