This opens the door to many possibilities to better use natural resources and improve many things.
Like "uncle Ben" said: "With great power comes great responsibilities" (I'm sure you know where that comes from ). There is always a way to misuse capabilities.
Recently I ran into an interesting video on Ted called Tracking the trackers.
It is basically about how many different sites that you may have never visited can track you and your information and you can't say anything about it.
You can find this video at: Tracking the trackers
It is about a basically unregulated industry doing what is called "behavioral tracking". Apparently it is a $39B industry!
the video is a little under 7 minutes. Enjoy.
It is easy to jump from stealth tracking to security concerns: What is going on in your network?
If your systems are accessible through the network, you should take a close look at how secure they are. Make sure your INFORMIXDIR files all have appropriate access control.
What about your users log ins? Have you setup your environment in case of denial of service attacks?
Maybe it's time to review this URL: http://publib.boulder.ibm.com/infocenter/idshelp/v117/topic/com.ibm.sec.doc/SEC_wrapper.htm