3 Key Components of Data Protection