http://www.newsfactor.com/perl/story/19028.html
Token encryption.
If a user wearing the system's security token walks away from his or her
laptop, the system senses it and begins securing the computer by
encrypting all data. If the user then returns within range, the computer
begins unlocking data so work can resume.
"Its safe,its very safe!" MM.