The method for securing data on a personal computer having security
sensitive content grouped into security levels, each with a clearance
code, includes filtering and extracting sensitive content by security
level and separately storing the security content in remote extract
stores. Remainder data is stored locally or remotely. A map for selected
extract stores may be generated. The filter and/or map may be destroyed
or stored. The data input, extracted data and remainder data may be
deleted from the originating computer. Encryption may be utilized to
enhance security (including transfers of data, filter and map).
Reconstruction of the data is permitted only in the presence of a
predetermined security clearance. Full or partial reconstruction is
possible, based upon the security clearances. A computer readable medium
containing programming instructions and an information processing system
is encompassed.