You terminate an employee.  Before you disable that employee’s login password, he downloads sensitive information to take with him.  Ideally, that information is encrypted and can’t be read on any outside computer.  But you never know what a capable hacker can do and once the information has been taken, the damage might be irreversible.  The