What tactical information could be compromised? Examples include private employment compensation details, proposals to clients, plans for organizational changes, and the myriad of similar information that can be gained from reading a person's email, calendar, contacts, or collection of documents and spreadsheets.
What information about the company's network or computing infrastructure would be revealed that could facilitate an electronic attack? Examples of this type of information include usernames and passwords, dial in numbers, IP addressing schemes, DNS naming conventions, ISPs used, mail servers, and other networking details related to connecting the laptop to the corporate or Internet environment.
What personal information about the laptop owner can be obtained? Examples include personal financial information, confidential family matters, loss of prized digital photographs, credit card numbers and PINS.