How Are Information Assets Protected