mimi6251 mimi6251 25-01-2024 Computers and Technology contestada D. The sufficiency rules are in place to protect the confidentiality of the data