The data logged by DeviceLock can be checked against hash databases (collections of digital signatures of known, traceable data) and used in computer forensics.
For example, you can trace users copying signatured files, with reference to time and devices.
More information about hash databases and their samples can be found at the National Software Reference Library web site: http://www.nsrl.nist.gov