The method, used with a portable computing device, secures security
sensitive words, icons, etc. by determining device location within or
without a predetermined region and then extracting the security data from
the file, text, data object or whatever. The extracted data is separated
from the remainder data and stored either on media in a local drive or
remotely, typically via wireless network, to a remote store. Encryption
is used to further enhance security levels. Extraction may be automatic,
when the portable device is beyond a predetermined territory, or
triggered by an event, such a "save document" or a time-out routine.
Reconstruction of the data is permitted only in the presence of a
predetermined security clearance and within certain geographic
territories. A computer readable medium containing programming
instructions carrying out the methodology for securing data is also
described herein. An information processing system for securing data is
also described.