ensuring data accessed by authorized users are only used for an authorized purpose.
a. attribute
b business rule
c. entity
d. primary key
e. relationship
f. confidentiality
g. data integrity
h. data privacy
I data security

Q&A Education