Location based security rules are provided for preventing unauthorized
access to a device, application, system, content, and/or network, etc.
The location-based security rules enable a user, computing device,
system, etc. to access the requested item or information when the user
provides proper identification information. The proper identification
information is based in part on the location of the user and/or the
user's access request.