Return to Article Details Data Protection: A Case Study on How to Assuage Theft of Data Download Download PDF