Cell phones and PDAs also increasingly store confidential information and therefore need the same types of controls that are used for laptops. It is also important to restrict access to network printers, because they often store document images on their hard drives. There have been cases where intruders have stolen the hard drives in those printers, thereby gaining access to sensitive information.