Section 508 (Revised) Report - Microsoft

For example, current password and encryption methods can be circumvented using recovery software available on the Internet that accesses the disk when Windows is offline. Even if the data on a lost or stolen computer is not sensitive, this method can be used to access an enterprise network that does contain sensitive data. ................
................