Key Steps to Securing Data and Maintaining Proper Access