The method for securing data includes establishing a group of security
sensitive items, filtering data and extracting and separating the
security items from remainder data. The filtered data are separately
stored (locally on a PC or on another computer in a LAN or WAN or on the
Internet.) A map may be generated. The filter and/or map may be destroyed
or stored. The data input, extracted data and remainder data may be
deleted from the originating computer. Encryption may be utilized to
enhance security (including transfers of data, filter and map).
Reconstruction of the data is permitted only in the presence of a
predetermined security clearance. A plurality of security clearances may
be used to enable a corresponding plurality of partial, reconstructed
views of the plaintext (omitting higher security words). A computer
readable medium containing programming instructions and an information
processing system is encompassed.