The method for securing data in a distributed computer system for security
sensitive content includes granularly extracting sensitive content, per
security level, from remainder data. The security sensitive content is
classified into security levels, each having a security clearance. The
extracted data is remotely stored in extract stores. The controlled
release of extracted data occurs with the appropriate security
clearances. Maps of storage sites and filters for repetitive extraction
may be employed, stored and then sometimes destroyed. The data input,
extracted data and remainder data may be deleted from the originating
source. Encryption, unique to each security level, enhances security
(preferably during transfers, storage and retrieval). Full or partial
reconstruction of the data is permitted with security clearances. An
information processing system is encompassed.