How is security ensured in both accessing and transmitting data?