A technique for providing data security through the removal of elements of
a database table, be they the data fields themselves, or structural
components, such as connection information that defines how, for example,
the elements of a database are structured. The removed elements are
placed in a secure location, retrievable only by having knowledge of a
new primary key stored with the removed elements.