A. The implementation of confidentiality, integrity, and availability
B. A system's ability to protect the confidentiality of sensitive information
C. An individual's control over personal information
D. A policy implementing strong identity management processes