>Another thing you can do is look into some of the encryption libraries. While the users would have access to the data, if it is all encrypted there is not much they can do with it.
Except destroy it < s >
The Anonymous Bureaucrat,
and frankly, quite content not to be
a member of either major US political party.