. "Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential." . . .