§Access is most often controlled by the holder of the
data
§Systems have been designed to see that the right
people have access only to the data they need
§Access to the data is usually password protected
§Protection of the source
of the data is highly protected
□Within
the internet search industry, it is so highly protected that there is no concrete evidence of exactly how it is protected
□Access
and security regarding the ability to search is completely disregarded since the ability to perform a search is of paramount
importance in the internet search industry