Technological safeguards and managerial procedures which can be applied to computer hardware, programs and data to assure that organizational assets and individual privacy are protected.
The protection of data against unauthorized access. Programs and data can be secured by issuing identification numbers and passwords to all authorized users of the system.