ID cards. Encryption devices can turn information into codes that are virtually impossible to crack. But good security requires something from everyone involved with information systems. Both the suppliers and users of computers, software and telecommunications have a responsibility to help ensure that such information systems are used conscientiously, and with the understanding that other people depend on these systems too. Because when it comes to keeping information secure, each one of us is in the driver’s seat. ==%==•