Accordingly, even if an illicit copier managed to copy or move the data residing within the encrypted memory space to another (external) device such as a writable CD-ROM, ZIP??? brand storage device, hard drive, or other storage device, the data would be of little or no use to the illicit copier.