Protection Against a Data Breach and Protocols to Follow Once Affected