Identifying What Information Is Protected