The document discusses current limits on access to information and how they should change. It covers data trails from web server logs and email that can reveal journalists' sources. It also discusses watermarking of leaked documents and trusted computing technologies that can restrict access. The document argues for preventing long-term data retention and raising the standard required for access to journalists' data and sources.