Which of the following is the BEST method for preventing the leakage of confidential information in a laptop computer?