摘要 |
<P>PROBLEM TO BE SOLVED: To solve the problem that when a computer is passed into outside third party's possession due to burglary or loss or unsuitable discard, information in the computer is also leaked, and that although the internal information is protected by individually managing the computer in the status quo, it is impossible to cope with burglary when a person who knows the method or a person in charge who is given a password is involved in the burglary. <P>SOLUTION: This information protecting method includes: making a server manage a computer terminal through a computer network; preparing a state that the computer terminal can not be used when the computer terminal is detached from the computer network; excluding management by an individual in charge of the treatment of a computer from information management corresponding to the burglary of the computer terminal; and performing the setting or change of information protection through the server. <P>COPYRIGHT: (C)2006,JPO&NCIPI |