These measures include the greatest possible ceiling of the circle of people so as to has the right to the delicate data and limitation of the aptitude of the authorised persons to accomplish changes, as well as technical barriers to infringement, including encryption during broadcast and storage, firewalls, strict requirements designed for passwords, and alert functions with coverage upon attempted unauthorised infringement. At the same time, they conceal these transactions if possible.

1 2 3 4 5 6 7 8