Of course we take all reasonable measures to ensure only people we know gain access to our systems and our data (confidentiality through authentication) and that they do so according to the rules and roles we have specified (and authorization). We implement validations to prevent invalid data from entering our […]