9 [ Application software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; computer software programs for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; recorded computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; downloadable computer software controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security for business purposes; ] computer software for authorising access to data bases; [ computer software products, for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; ] computer software programs for email management; interactive computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; [ computer software downloaded from the internet for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; ] active electronic labels containing coded information; apparatus for electronic digital processing, namely, data processors and digital signal processors; computer software for data security; computer software for protection of data; computer software for secure communication; computer software for internet security