Software adheres to the standards of privacy if it (1 point)

-is independent of platforms and systems, or can be easily adapted.

-uses code that is encrypted before being merged into the project tree.

-protects the system from hacking.

-protects client data against unauthorized access and use.