. . "Various methods have been used to control access to information stored on data storage devices such as CDs, DVDs, floppy disks, and so forth." . .