A security system purposely damages at least a portion of content
material, using a damaging process that is easily reversible, until a
verification of authorization is determined. While the authorization to
access the content material is in an unverified state, an undamaged
version is provided for immediate rendering, but any stored versions of
the content material is stored in the damaged state. When the
authorization is verified, the damaging process ceases, and the stored
damaged version is repaired, thereby allowing unimpeded subsequent access
to the authorized content material. If sufficient evidence is obtained to
warrant a determination that the content material is unauthorized, the
access to the material is terminated, and any stored content material
remains in the damaged state, thereby precluding subsequent access to the
unauthorized content material.