SlideShare a Scribd company logo
1 of 4
Many companies attempt to implement a security policy involving
encryption of portable data, but the policy has no way to be enforced
unless the portable drive utilizes hardware encryption, or alternatively,
utilizes encryption software installed on the computer to encrypt the data
loaded onto the portable drive.
This simplest method of enforcing encryption is to implement a policy
exclusively allowing only the use of hardware encrypted flash drives that
do not have partitions. This way, if a drive is lost, data stored on the drive
is secure because there is no way to load data on the drive without it being
encrypted. This is often not the case with USB flash drives that utilize
software-based encryption. In these cases, the user has the option
whether to store data in an encrypted partition or a non-encrypted
partition. If the flash drive is lost, the assumption must be that the data is
not secure and it opens the organization up to liability if there was any
chance that personal identifiable information existed on the drive.
Personal Identifiable Information might take the form of employee
information,
Customer records or patient records, and regulations exist to enforce
penalties in these situations.
For example:
• Nearly every U.S. state has implemented data breach reporting laws and
penalties that range from $250 to $750 per record of personal identifiable
information that is lost
• Some states are beginning to enforce the use of encryption and storage
of personal information
• The European Union and Canada have implemented serious mandates
for transmission of personal information, especially in regard to employees
• The U.S. Federal Government’s HITECH Act, further strengthens existing
HIPAA regulations in regard to ensuring portable data is using proper
encryption security processes or the healthcare institution or partner risks
up to $1.5 million in fines per violation
• Federal Information Security Act (FISMA) of 2002 established broad
security requirements for U.S. Federal Government agencies and
contractors and the OMB Memorandum M-06-16 requires that agencies
encrypt all data on mobile devices unless the agency has determined that
data to be non-sensitive. FIPS 140-2 establishes cryptographic
requirements and security levels for encrypting data.
• The Federal Trade Commission (FTC) will be implementing Red Flag Rules
for the financial institutions that enforce steps that will prevent identity
theft
Protect your sensitive files and folders with Clape - unique encryption
technology with an abundance of security options. This encryption
program sports a colorful and useful graphical interface, easy to use for
the uninitiated, yet powerful enough for the tech savvy. It provides
complete privacy, protecting your data from loss, theft, or virus attacks.
Incorporated into the software are unexpected security “extras” that
provide peace of mind for those obsessed with protecting their invaluable
data. On the surface these additional elements seem like icing on the cake,
but in reality they are necessary to ensure total security. Clape
Technologies has put a lot of thought into the creation of this program.
Clape is the #1 choice when it comes to protecting your data. No other
security utility provides all the features of high encryption, secure deletion,
stealth mode and speed of conversion in one easy-to-use package for total
secrecy.
Clape is straightforward and installs in less than a minute. No help is
needed when installing the software. Using the program is simple, just
drag and drop files and/or folders to the “FILE /FOLDER LIST” then
encryption starts automatically.
Another method the user can apply is click on “Import” Menu Item and
select file/folder to encrypt it.
Should you encounter any difficulty while using the software, a well
illustrated user's guide is incorporated into the program.
Data Security:
Clape's security is robust with 1024 bit encryption. Decryption was
transparent and showed no signs of lag even when playing a 1.7GB video
file. The original files are shredded after encryption, leaving no remains on
the user's PC, and file integrity was maintained after decryption. . Should
the user decide not to create a password, the password generator utility
will securely accomplish the task.
Feature Set:
Features at a glance:
Patent Pending Encryption Technology
1024 Bit Block Encryption
Facility of Recovery of forgotten password
Facility of Recovery of Data
File Search
Drag and Drop File Import (By Default in Encrypted Mode)
Keep a backup copy elsewhere
Auto lock after inactivity period
Change Password / Encryption Key
Quick Text Editor
Facility for selecting Random Password (Most Unique Feature)
USAGE:
A folder of files (.docs, videos, .pdfs, .txt, .zip) totaling 4 GB in size was
used to test the encryption and decryption speed of Clape. It took four
minutes to complete the encryption procedure. Decrypting files was
transparent and showed no performance hit. The Export, Import option
allows the user to encrypt, decrypt, or lock without going through the
main program.
Help and Documentation:
Clape has a built in help system with well illustrated graphics. If more help
is needed, the other choices are email (online form), knowledge base
(FAQs - frequently asked questions), how-to’s, on-line blog, tutorials,
postal address and social networking sites (Facebook, YouTube, Twitter,
etc.).
Summary:
USB FLASH DRIVES HAVE BECOME HUGELY POPULAR
They are the most convenient way to transfer large amounts of
data.
They use little power, are long lasting and reusable.
They work with any USB-equipped computer.
THERE IS A DOWNSIDE - “THE USB PROBLEM”
Tens of millions are lost yearly.
When a flash drive is lost, valuable data is exposed.
Loss of confidential data can have a devastating
effect on an organization.
To erase off all this problem Clape has been envisaged and
developed for the users.

More Related Content

What's hot

Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
Ramy Eltarras
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
Steph Cliche
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measures
Syafiqah Akemi
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
Aqib Memon
 
Nonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkNonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the Network
Holly Ross
 

What's hot (20)

Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measures
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
Week 12
Week 12Week 12
Week 12
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
 
System failure
System  failureSystem  failure
System failure
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Nonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkNonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the Network
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 

Similar to White paper clape

Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
DataExpress
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
softwaresatish
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Ravtach Solutions
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
e-Safe Systems
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 

Similar to White paper clape (20)

Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

White paper clape

  • 1. Many companies attempt to implement a security policy involving encryption of portable data, but the policy has no way to be enforced unless the portable drive utilizes hardware encryption, or alternatively, utilizes encryption software installed on the computer to encrypt the data loaded onto the portable drive. This simplest method of enforcing encryption is to implement a policy exclusively allowing only the use of hardware encrypted flash drives that do not have partitions. This way, if a drive is lost, data stored on the drive is secure because there is no way to load data on the drive without it being encrypted. This is often not the case with USB flash drives that utilize software-based encryption. In these cases, the user has the option whether to store data in an encrypted partition or a non-encrypted partition. If the flash drive is lost, the assumption must be that the data is not secure and it opens the organization up to liability if there was any chance that personal identifiable information existed on the drive. Personal Identifiable Information might take the form of employee information, Customer records or patient records, and regulations exist to enforce penalties in these situations. For example: • Nearly every U.S. state has implemented data breach reporting laws and penalties that range from $250 to $750 per record of personal identifiable information that is lost • Some states are beginning to enforce the use of encryption and storage of personal information • The European Union and Canada have implemented serious mandates for transmission of personal information, especially in regard to employees
  • 2. • The U.S. Federal Government’s HITECH Act, further strengthens existing HIPAA regulations in regard to ensuring portable data is using proper encryption security processes or the healthcare institution or partner risks up to $1.5 million in fines per violation • Federal Information Security Act (FISMA) of 2002 established broad security requirements for U.S. Federal Government agencies and contractors and the OMB Memorandum M-06-16 requires that agencies encrypt all data on mobile devices unless the agency has determined that data to be non-sensitive. FIPS 140-2 establishes cryptographic requirements and security levels for encrypting data. • The Federal Trade Commission (FTC) will be implementing Red Flag Rules for the financial institutions that enforce steps that will prevent identity theft Protect your sensitive files and folders with Clape - unique encryption technology with an abundance of security options. This encryption program sports a colorful and useful graphical interface, easy to use for the uninitiated, yet powerful enough for the tech savvy. It provides complete privacy, protecting your data from loss, theft, or virus attacks. Incorporated into the software are unexpected security “extras” that provide peace of mind for those obsessed with protecting their invaluable data. On the surface these additional elements seem like icing on the cake, but in reality they are necessary to ensure total security. Clape Technologies has put a lot of thought into the creation of this program. Clape is the #1 choice when it comes to protecting your data. No other security utility provides all the features of high encryption, secure deletion, stealth mode and speed of conversion in one easy-to-use package for total secrecy. Clape is straightforward and installs in less than a minute. No help is needed when installing the software. Using the program is simple, just drag and drop files and/or folders to the “FILE /FOLDER LIST” then encryption starts automatically.
  • 3. Another method the user can apply is click on “Import” Menu Item and select file/folder to encrypt it. Should you encounter any difficulty while using the software, a well illustrated user's guide is incorporated into the program. Data Security: Clape's security is robust with 1024 bit encryption. Decryption was transparent and showed no signs of lag even when playing a 1.7GB video file. The original files are shredded after encryption, leaving no remains on the user's PC, and file integrity was maintained after decryption. . Should the user decide not to create a password, the password generator utility will securely accomplish the task. Feature Set: Features at a glance: Patent Pending Encryption Technology 1024 Bit Block Encryption Facility of Recovery of forgotten password Facility of Recovery of Data File Search Drag and Drop File Import (By Default in Encrypted Mode) Keep a backup copy elsewhere Auto lock after inactivity period Change Password / Encryption Key Quick Text Editor Facility for selecting Random Password (Most Unique Feature)
  • 4. USAGE: A folder of files (.docs, videos, .pdfs, .txt, .zip) totaling 4 GB in size was used to test the encryption and decryption speed of Clape. It took four minutes to complete the encryption procedure. Decrypting files was transparent and showed no performance hit. The Export, Import option allows the user to encrypt, decrypt, or lock without going through the main program. Help and Documentation: Clape has a built in help system with well illustrated graphics. If more help is needed, the other choices are email (online form), knowledge base (FAQs - frequently asked questions), how-to’s, on-line blog, tutorials, postal address and social networking sites (Facebook, YouTube, Twitter, etc.). Summary: USB FLASH DRIVES HAVE BECOME HUGELY POPULAR They are the most convenient way to transfer large amounts of data. They use little power, are long lasting and reusable. They work with any USB-equipped computer. THERE IS A DOWNSIDE - “THE USB PROBLEM” Tens of millions are lost yearly. When a flash drive is lost, valuable data is exposed. Loss of confidential data can have a devastating effect on an organization. To erase off all this problem Clape has been envisaged and developed for the users.