The implementation of administrative, technical, or physical measures to guard against the unauthorized access to data.