The unit comes with a docking station for connecting to your computer, but there's also a standard USB port on the bottom of the unit in addition to the docking connector, so presumably you don't need to lug the dock around with you to transfer files on the go.
It is inserted into a computer system through a USB port rather than over the Internet, and is therefore capable of infiltrating networks that are not connected to the Internet.
In this case, the cyber identity of this file would be a full set of its cyber coordinates in the IP subspace: the computer IP address, its MAC address, a Port number associated with the particular application, and the file name would constitute the full set of cyber coordinates, singularly identifying a cyber object (our file) in cyberspace.