Computer Science (Year 9)

Data Security

Which of the following is a method to protect data privacy?