A computing system includes data encryption in the data path between a
data source and data storage devices. The data encryption may utilize a
key which is derived at least in part from an identification code stored
in a non-volatile memory. The key may also be derived at least in part
from user input to the computer.