The present invention provides techniques for protecting information in a
computing device. For instance, a location of the computing device is
detected. It is determined whether the location is an unauthorized
location. Access to the information is restricted in response to the
location being an unauthorized location. As another example, information
in a computing device may be protected by detecting location of the
computing device. It is determined whether the location is an
unauthorized location. One or more decoy files are created in the
information in response to the location being an unauthorized location.