Watch this video on YouTube
Which of the following is a technique used to protect the confidentiality of data?