Software adheres to the standards of privacy if it (1 point)
-is independent of platforms and systems, or can be easily adapted.
-uses code that is encrypted before being merged into the project tree.
-protects the system from hacking.
-protects client data against unauthorized access and use.