This article appeared in Cybersecurity Law & Strategyan ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.

Once upon a time, before the age of computers, when a business needed to secure and protect information and assets, discussions centered on limiting physical access to offices, paper files, and tangible documents. Locked file cabinets, restricted areas, and limited personnel access were the order of the day.