1.6 (Chapter 8) Security, privacy and data integrity