This edition of the Security in Brief series introduces the concepts of computers that can appropriately protect their data (compliant computers) and those that cannot (noncompliant computers) and the concept of data with value (Type A) and data with no discernible value (Type B). Appropriate use of compliant computers to store, process, and transmit Type A data is discussed as is the appropriate use of noncompliant computers for Type B data (tha requires no protection). Finally use of alternative protection measures to redress inadequacies in noncompliant computers is discussed as exercises in risk management.