To answer your comments on security issues, I have the same question but with respect to the potential use of this volume of information, the ease of access for malicious purposes. I'm not thinking of security now; I'm thinking of personally malicious purposes.
What thought goes into what appears in this cache of information?