Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

It refers to the practices used to protect electronic data and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.