A method (10) for managing the display of sensitive content in non-trusted
environments can include the steps of interrogating (12) a list of
policies associated with a given user and a physical device, determining
(14) a location of the physical device, comparing (18) the location of
the physical device with a list of trusted locations, and enforcing (20)
a plurality of rules contained in the policy by limiting or restricting
access to sensitive information based on the location.