Patent attributes
Techniques for selectively filtering data are discussed herein. For example, a request to include data in an electronic message or a request to copy the data to a portable storage device may be received. If the data is sensitive data, the techniques may determine a software application that was opened or closed prior to receiving the request, or information that was accessed prior to receiving the request. The techniques may determine if including the data in the electronic message or copying the data to the portable storage device poses a security risk. If a security risk is identified, a task may be performed, such as alerting a network administrator, providing a notification to a user regarding the data, or preventing copying or transmission of the data.