Well for devices with touch screens I dont see it so difficult to add an authentication step in the boot process. Just display a virtual keyboard and let the user punch some keys.
As for the corporate environment I would say that nothing prevents an employee from copying/distributing/stealing IP from the company in the form of documents. BUT, for a company to adopt such a scheme in a company wide range certain requirements must be met. I am talking about accidental incidents and not intentional/malicious acts.
|