. . . "This can be done, for example, by including instructions in the recipient software that can find and erases any residual copies of the content from other memory devices at the recipient." .