. . . . "It talks about who should have access to the data and that methods such as encryption should be employed." .