The document discusses protecting corporate data from theft and leakage. It identifies common causes of data breaches like weak internal controls, lack of policies and awareness. The document differentiates between data theft, where data is intentionally stolen, and leakage, where data is accidentally released. It provides examples of how data is typically taken, like through portable storage devices, email and printing. Finally, it outlines steps companies can take to better protect their data, such as identifying and classifying sensitive data, assessing risks, developing policies and using auditing tools.