In some embodiments, the security rules may also select processes associated with each file, directory, section and block wherein the processes include methods including encryption, destruction, user authentication and other processes used in the protection, handling and manipulation of the information.