A method, system and apparatus for identifying unauthorized access to
memory locations in a multi-element data storage device. The invention
includes a restrictive key that is physically coupled to at least one
inaccessible memory element in the data storage device. The key prevents
the user from accessing the data in that element. A securing device
connects the restrictive key to the data storage device's housing. When
the key is altered from its initial position, the securing device is
broken. Because the securing device is at least partially located on the
outside of the device housing, it is readily visible. Therefore, if the
securing device has been broken, the key to which the securing device was
coupled was necessarily moved. This provides visual evidence that there
has been an attempt to access one or more data memory areas that had been
previously been rendered inaccessible by the restrictive key.