Techniques for managing files in a designated location are disclosed. An
example of the designated location is a folder, a directory, a
repository, a device, or a storage place. A set of access rules is
applied to a designated location such that all files in the designated
location shall have substantially similar security. As a result, secured
files can be easily created and managed with respect to the designated
location and users with access privilege to the designated location can
access most of the files, in not all, in the designated location.