1811:
153:
or a malicious program cannot gain access to secure data protected by hardware or perform unauthorized privileged operations. This assumption is broken only if the hardware itself is malicious or contains a backdoor. The hardware protects the operating system image and file system privileges from
229:
is used to ensure that personal data is accessible to those whom it concerns, and provides redress to individuals if there are inaccuracies. This is particularly important to ensure individuals are treated fairly, for example for credit checking purposes. The Data
Protection Act states that only
144:
such as hard disks. Illegal access by a malicious user or a malicious program is interrupted based on the current state of a user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based access control is more secure than the protection provided by the operating
189:
of structured data is the process of obscuring (masking) specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel. This may include masking the data from users (for example so banking customer
277:, and one of its cardinal principles is that all stored information, i.e. data, should be owned so that it is clear whose responsibility it is to protect and control access to that data. The following are examples of organizations that help strengthen and standardize computing security:
326:. Access controls manage user entry and data manipulation, while flow controls regulate data dissemination. Inference controls prevent deduction of confidential information from statistical databases and data encryption prevents unauthorized access to confidential information.
190:
representatives can only see the last four digits of a customer's national identity number), developers (who need real production data to test new software releases but should not be able to see sensitive financial data), outsourcing vendors, etc.
253:(EU) became law on May 25, 2018, organizations may face significant penalties of up to €20 million or 4% of their annual revenue if they do not comply with the regulation. It is intended that GDPR will force organizations to understand their
171:
are used to ensure data that is lost can be recovered from another source. It is considered essential to keep a backup of any data in most industries and the process is recommended for any files of importance to a user.
207:
is a method of software-based overwriting that completely wipes all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is lost when an asset is retired or reused.
109:
to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read and write access to data, which provides very strong protection against tampering and unauthorized access.
1329:
133:). However, dongles can be used by anyone who can gain physical access to it. Newer technologies in hardware-based security solve this problem by offering full proof of security for data.
1438:
149:
and hackers. The data on hard disks can be corrupted after malicious access is obtained. With hardware-based protection, the software cannot manipulate the user privilege levels. A
314:
proposed by the
European Commission will strengthen and unify data protection for individuals within the EU, whilst addressing the export of personal data outside the EU.
1433:
708:
125:
or a mobile phone may be more secure due to the physical access required in order to be compromised. Access is enabled only when the token is connected and the correct
154:
being tampered with. Therefore, a completely secure system can be created using a combination of hardware-based security and secure system administration policies.
1483:
601:
140:
to prevent malicious users from logging in, logging out, and changing privilege levels. The current state of a user of the device is read by controllers in
1498:
1379:
136:
Working off hardware-based security: A hardware device allows a user to log in, log out and set different levels through manual actions. The device uses
1710:
1418:
730:
1675:
1614:
1503:
772:
750:
734:
1369:
1448:
623:
288:
649:
291:(PCI DSS) is a proprietary international information security standard for organizations that handle cardholder information for the major
584:
1458:
1374:
1364:
786:
883:
376:
854:
829:
1690:
704:
525:
469:
Summers, G. (2004). Data and databases. In: Koehne, H Developing
Databases with Access: Nelson Australia Pty Limited. p4-5.
1513:
1319:
550:
1670:
1478:
1468:
1428:
257:
risks and take the appropriate measures to reduce the risk of unauthorized disclosure of consumers’ private information.
1410:
1384:
1344:
479:
311:
246:
1587:
1508:
1493:
1389:
1253:
418:
230:
individuals and companies with legitimate and lawful reasons can process personal information and cannot be shared.
1276:
605:
1463:
1394:
1359:
1685:
1665:
1619:
1582:
1488:
1443:
959:
126:
1592:
1423:
1398:
1453:
804:
433:
1473:
438:
742:
150:
1705:
1649:
1629:
1354:
1314:
932:
341:
130:
1840:
1043:
1039:
921:
443:
322:
The four types of technical safeguards are access controls, flow controls, inference controls, and
226:
82:
74:
1700:
1695:
1567:
1349:
968:
398:
383:
281:
619:
1835:
1741:
1339:
1334:
1281:
1070:
645:
1720:
1291:
1246:
448:
346:
86:
573:
1539:
1324:
1200:
738:
393:
388:
274:
8:
1756:
1624:
1609:
1559:
1296:
1140:
1125:
1053:
403:
366:
78:
30:, from destructive forces and from the unwanted actions of unauthorized users, such as a
879:
790:
97:
Software-based security solutions encrypt the data to protect it from theft. However, a
1796:
952:
531:
141:
1766:
1549:
1130:
1120:
984:
766:
521:
239:
114:
1814:
1680:
1639:
1577:
1529:
1286:
1239:
1080:
1029:
1014:
994:
979:
729:
680:
535:
513:
231:
677:
FAST'11: Proceedings of the 9th USENIX conference on File and storage technologies
1544:
1534:
1210:
1145:
1135:
1105:
1048:
1019:
1009:
672:
371:
336:
106:
66:
58:
52:
517:
92:
1781:
1761:
1634:
1220:
1215:
1180:
1160:
1155:
1110:
1085:
1004:
505:
423:
250:
222:
146:
118:
1829:
1751:
1644:
1604:
1599:
1175:
1150:
1024:
989:
945:
361:
270:
266:
684:
1791:
1572:
1195:
1190:
1170:
1165:
1095:
1090:
1065:
1058:
1034:
356:
351:
304:
284:
is an organization that helps standardize computing security technologies.
254:
204:
199:
186:
181:
23:
1786:
1306:
1115:
1075:
746:
510:
2009 IEEE 6th
International Conference on Mobile Adhoc and Sensor Systems
408:
296:
35:
31:
671:
Michael Wei; Laura M. Grupp; Frederick E. Spada; Steven
Swanson (2011).
1771:
428:
323:
292:
137:
62:
1736:
1205:
1100:
145:
systems as operating systems are vulnerable to malicious attacks by
999:
70:
27:
504:
Thanh, Do van; Jorstad, Ivar; Jonvik, Tore; Thuan, Do van (2009).
1262:
413:
300:
235:
98:
168:
163:
102:
122:
1776:
927:
93:
Software versus hardware-based mechanisms for protecting data
904:
Denning, Dorothy E., and Peter J. Denning. "Data security."
1715:
673:"Reliably Erasing Data From Flash-Based Solid State Drives"
506:"Strong authentication with mobile phone as security token"
1231:
117:
offers an alternative to software-only computer security.
581:
Proceedings of the IEEE Symposium on
Security and Privacy
937:
503:
69:. Disk encryption typically takes form in either
571:
551:"Why the World is Moving to Hardware-Based Security"
211:
1711:International Association of Privacy Professionals
1827:
1676:Computer Professionals for Social Responsibility
805:"Detect and Protect for Digital Transformation"
723:
1247:
953:
273::2013 cover data security under the topic of
928:EU General Data Protection Regulation (GDPR)
771:: CS1 maint: multiple names: authors list (
572:Waksman, Adam; Sethumadhavan, Simha (2011),
289:Payment Card Industry Data Security Standard
85:). Disk encryption is often referred to as
1254:
1240:
960:
946:
260:
312:General Data Protection Regulation (GDPR)
480:"Knowing Your Data to Protect Your Data"
1828:
664:
548:
377:Comparison of disk encryption software
1691:Electronic Privacy Information Center
1235:
941:
216:
113:Hardware-based security or assisted
1671:Center for Democracy and Technology
670:
652:from the original on 5 January 2018
65:technology that encrypts data on a
13:
711:from the original on 13 April 2016
247:General Data Protection Regulation
89:(OTFE) or transparent encryption.
46:
14:
1852:
915:
886:from the original on 2 March 2016
419:Security breach notification laws
1810:
1809:
1277:Right of access to personal data
753:from the original on 20 May 2011
212:International laws and standards
922:Getting Ready for New Data Laws
898:
872:
847:
822:
797:
779:
697:
626:from the original on 2017-02-27
590:from the original on 2013-09-28
242:that occurs every January 28.
193:
175:
41:
1686:Electronic Frontier Foundation
1666:American Civil Liberties Union
1620:Privacy-enhancing technologies
638:
612:
602:"Back-ups | Stay Smart Online"
594:
574:"Silencing Hardware Backdoors"
565:
542:
497:
472:
463:
451:for cyber security investments
1:
933:Countering ransomware attacks
456:
317:
906:ACM computing surveys (CSUR)
549:Stubbs, Rob (Sep 10, 2019).
265:The international standards
7:
1411:Data protection authorities
1261:
518:10.1109/MOBHOC.2009.5336918
439:Transparent data encryption
329:
307:, and point of sale cards.
10:
1857:
1615:Social networking services
743:"Celebrating data privacy"
197:
179:
161:
157:
50:
16:Protection of digital data
1805:
1729:
1706:Global Network Initiative
1658:
1650:Virtual assistant privacy
1630:Privacy-invasive software
1558:
1522:
1409:
1305:
1269:
975:
620:"Data Masking Definition"
342:Cyber-security regulation
305:automated teller machines
131:two-factor authentication
967:
444:USB flash drive security
83:disk encryption hardware
75:disk encryption software
1701:Future of Privacy Forum
1696:European Digital Rights
583:, Oakland, California,
399:Pre-boot authentication
384:Identity-based security
282:Trusted Computing Group
261:International standards
1742:Cellphone surveillance
1659:Advocacy organizations
1282:Expectation of privacy
1721:Privacy International
1292:Right to be forgotten
908:11.3 (1979): 227-249.
705:"data protection act"
347:Data-centric security
87:on-the-fly encryption
26:, such as those in a
1141:Protection (privacy)
924:- Local Gov Magazine
880:"PCI DSS Definition"
855:"ISO/IEC 27002:2013"
830:"ISO/IEC 27001:2013"
739:Shuman Ghosemajumder
512:. pp. 777–782.
394:IT network assurance
389:Information security
275:information security
234:is an international
138:biometric technology
121:such as those using
1757:Global surveillance
1625:Privacy engineering
1610:Personal identifier
1560:Information privacy
1297:Post-mortem privacy
404:Privacy engineering
367:Digital inheritance
227:Data Protection Act
1797:Personality rights
836:. 16 December 2020
217:International laws
142:peripheral devices
1823:
1822:
1767:Mass surveillance
1229:
1228:
1221:Wrangling/munging
1071:Format management
527:978-1-4244-5114-2
449:Gordon–Loeb model
240:Council of Europe
115:computer security
99:malicious program
22:means protecting
1848:
1813:
1812:
1681:Data Privacy Lab
1640:Privacy software
1287:Right to privacy
1256:
1249:
1242:
1233:
1232:
962:
955:
948:
939:
938:
909:
902:
896:
895:
893:
891:
876:
870:
869:
867:
866:
851:
845:
844:
842:
841:
826:
820:
819:
817:
815:
801:
795:
794:
789:. Archived from
787:"GDPR Penalties"
783:
777:
776:
770:
762:
760:
758:
727:
721:
720:
718:
716:
701:
695:
694:
692:
691:
668:
662:
661:
659:
657:
642:
636:
635:
633:
631:
616:
610:
609:
604:. Archived from
598:
592:
591:
589:
578:
569:
563:
562:
560:
558:
546:
540:
539:
501:
495:
494:
492:
491:
484:IT Business Edge
476:
470:
467:
232:Data Privacy Day
129:is entered (see
107:corrupt the data
1856:
1855:
1851:
1850:
1849:
1847:
1846:
1845:
1841:Data management
1826:
1825:
1824:
1819:
1801:
1725:
1654:
1554:
1518:
1405:
1399:amended in 2020
1301:
1265:
1260:
1230:
1225:
1201:Synchronization
971:
966:
918:
913:
912:
903:
899:
889:
887:
878:
877:
873:
864:
862:
861:. 15 April 2021
853:
852:
848:
839:
837:
828:
827:
823:
813:
811:
803:
802:
798:
785:
784:
780:
764:
763:
756:
754:
731:Peter Fleischer
728:
724:
714:
712:
703:
702:
698:
689:
687:
669:
665:
655:
653:
644:
643:
639:
629:
627:
618:
617:
613:
600:
599:
595:
587:
576:
570:
566:
556:
554:
547:
543:
528:
502:
498:
489:
487:
478:
477:
473:
468:
464:
459:
454:
372:Disk encryption
337:Copy protection
332:
324:data encryption
320:
263:
238:started by the
219:
214:
202:
196:
184:
178:
166:
160:
119:Security tokens
95:
67:hard disk drive
59:Disk encryption
55:
53:Disk encryption
49:
47:Disk encryption
44:
17:
12:
11:
5:
1854:
1844:
1843:
1838:
1821:
1820:
1818:
1817:
1806:
1803:
1802:
1800:
1799:
1794:
1789:
1784:
1782:Search warrant
1779:
1774:
1769:
1764:
1762:Identity theft
1759:
1754:
1749:
1744:
1739:
1733:
1731:
1727:
1726:
1724:
1723:
1718:
1713:
1708:
1703:
1698:
1693:
1688:
1683:
1678:
1673:
1668:
1662:
1660:
1656:
1655:
1653:
1652:
1647:
1642:
1637:
1635:Privacy policy
1632:
1627:
1622:
1617:
1612:
1607:
1602:
1597:
1596:
1595:
1590:
1585:
1575:
1570:
1564:
1562:
1556:
1555:
1553:
1552:
1547:
1542:
1537:
1532:
1526:
1524:
1520:
1519:
1517:
1516:
1514:United Kingdom
1511:
1506:
1501:
1496:
1491:
1486:
1481:
1476:
1471:
1466:
1461:
1456:
1451:
1446:
1441:
1436:
1431:
1429:European Union
1426:
1421:
1415:
1413:
1407:
1406:
1404:
1403:
1402:
1401:
1387:
1385:United Kingdom
1382:
1377:
1372:
1367:
1362:
1357:
1352:
1347:
1345:European Union
1342:
1337:
1332:
1327:
1322:
1317:
1311:
1309:
1303:
1302:
1300:
1299:
1294:
1289:
1284:
1279:
1273:
1271:
1267:
1266:
1259:
1258:
1251:
1244:
1236:
1227:
1226:
1224:
1223:
1218:
1213:
1208:
1203:
1198:
1193:
1188:
1183:
1178:
1173:
1168:
1163:
1158:
1153:
1148:
1143:
1138:
1133:
1128:
1126:Pre-processing
1123:
1118:
1113:
1108:
1103:
1098:
1093:
1088:
1083:
1078:
1073:
1068:
1063:
1062:
1061:
1056:
1051:
1037:
1032:
1027:
1022:
1017:
1012:
1007:
1002:
997:
992:
987:
982:
976:
973:
972:
965:
964:
957:
950:
942:
936:
935:
930:
925:
917:
916:External links
914:
911:
910:
897:
871:
846:
821:
796:
793:on 2018-03-31.
778:
722:
696:
663:
646:"data masking"
637:
611:
608:on 2017-07-07.
593:
564:
541:
526:
496:
471:
461:
460:
458:
455:
453:
452:
446:
441:
436:
431:
426:
424:Single sign-on
421:
416:
411:
406:
401:
396:
391:
386:
381:
380:
379:
369:
364:
359:
354:
349:
344:
339:
333:
331:
328:
319:
316:
262:
259:
251:European Union
249:(GDPR) of the
218:
215:
213:
210:
198:Main article:
195:
192:
180:Main article:
177:
174:
162:Main article:
159:
156:
94:
91:
51:Main article:
48:
45:
43:
40:
15:
9:
6:
4:
3:
2:
1853:
1842:
1839:
1837:
1836:Data security
1834:
1833:
1831:
1816:
1808:
1807:
1804:
1798:
1795:
1793:
1790:
1788:
1785:
1783:
1780:
1778:
1775:
1773:
1770:
1768:
1765:
1763:
1760:
1758:
1755:
1753:
1752:Eavesdropping
1750:
1748:
1747:Data security
1745:
1743:
1740:
1738:
1735:
1734:
1732:
1728:
1722:
1719:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1697:
1694:
1692:
1689:
1687:
1684:
1682:
1679:
1677:
1674:
1672:
1669:
1667:
1664:
1663:
1661:
1657:
1651:
1648:
1646:
1645:Secret ballot
1643:
1641:
1638:
1636:
1633:
1631:
1628:
1626:
1623:
1621:
1618:
1616:
1613:
1611:
1608:
1606:
1605:Personal data
1603:
1601:
1598:
1594:
1591:
1589:
1586:
1584:
1581:
1580:
1579:
1576:
1574:
1571:
1569:
1566:
1565:
1563:
1561:
1557:
1551:
1548:
1546:
1543:
1541:
1538:
1536:
1533:
1531:
1528:
1527:
1525:
1521:
1515:
1512:
1510:
1507:
1505:
1502:
1500:
1497:
1495:
1492:
1490:
1487:
1485:
1482:
1480:
1477:
1475:
1472:
1470:
1467:
1465:
1462:
1460:
1457:
1455:
1452:
1450:
1447:
1445:
1442:
1440:
1437:
1435:
1432:
1430:
1427:
1425:
1422:
1420:
1417:
1416:
1414:
1412:
1408:
1400:
1396:
1393:
1392:
1391:
1390:United States
1388:
1386:
1383:
1381:
1378:
1376:
1373:
1371:
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1326:
1323:
1321:
1318:
1316:
1313:
1312:
1310:
1308:
1304:
1298:
1295:
1293:
1290:
1288:
1285:
1283:
1280:
1278:
1275:
1274:
1272:
1268:
1264:
1257:
1252:
1250:
1245:
1243:
1238:
1237:
1234:
1222:
1219:
1217:
1214:
1212:
1209:
1207:
1204:
1202:
1199:
1197:
1194:
1192:
1189:
1187:
1184:
1182:
1179:
1177:
1174:
1172:
1169:
1167:
1164:
1162:
1159:
1157:
1154:
1152:
1149:
1147:
1144:
1142:
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1060:
1057:
1055:
1052:
1050:
1047:
1046:
1045:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1008:
1006:
1003:
1001:
998:
996:
993:
991:
988:
986:
983:
981:
978:
977:
974:
970:
963:
958:
956:
951:
949:
944:
943:
940:
934:
931:
929:
926:
923:
920:
919:
907:
901:
885:
881:
875:
860:
856:
850:
835:
831:
825:
810:
806:
800:
792:
788:
782:
774:
768:
752:
748:
744:
740:
736:
732:
726:
710:
706:
700:
686:
682:
678:
674:
667:
651:
647:
641:
625:
621:
615:
607:
603:
597:
586:
582:
575:
568:
552:
545:
537:
533:
529:
523:
519:
515:
511:
507:
500:
485:
481:
475:
466:
462:
450:
447:
445:
442:
440:
437:
435:
432:
430:
427:
425:
422:
420:
417:
415:
412:
410:
407:
405:
402:
400:
397:
395:
392:
390:
387:
385:
382:
378:
375:
374:
373:
370:
368:
365:
363:
362:Data recovery
360:
358:
355:
353:
350:
348:
345:
343:
340:
338:
335:
334:
327:
325:
315:
313:
308:
306:
302:
298:
294:
290:
285:
283:
278:
276:
272:
271:ISO/IEC 27002
268:
267:ISO/IEC 27001
258:
256:
252:
248:
243:
241:
237:
233:
228:
224:
209:
206:
201:
191:
188:
183:
173:
170:
165:
155:
152:
148:
143:
139:
134:
132:
128:
124:
120:
116:
111:
108:
104:
100:
90:
88:
84:
80:
76:
72:
68:
64:
60:
54:
39:
37:
33:
29:
25:
21:
20:Data security
1792:Human rights
1746:
1307:Privacy laws
1185:
1131:Preservation
1121:Philanthropy
985:Augmentation
905:
900:
888:. Retrieved
874:
863:. Retrieved
858:
849:
838:. Retrieved
833:
824:
812:. Retrieved
808:
799:
791:the original
781:
755:. Retrieved
735:Jane Horvath
725:
713:. Retrieved
699:
688:. Retrieved
676:
666:
654:. Retrieved
640:
628:. Retrieved
614:
606:the original
596:
580:
567:
557:30 September
555:. Retrieved
544:
509:
499:
488:. Retrieved
486:. 2017-09-25
483:
474:
465:
434:Tokenization
357:Data masking
352:Data erasure
321:
309:
286:
279:
264:
255:data privacy
244:
220:
205:Data erasure
203:
200:Data erasure
194:Data erasure
187:Data masking
185:
182:Data masking
176:Data masking
167:
135:
112:
96:
56:
42:Technologies
24:digital data
19:
18:
1787:Wiretapping
1499:Switzerland
1484:South Korea
1474:Philippines
1464:Netherlands
1459:Isle of Man
1380:Switzerland
1360:New Zealand
1191:Stewardship
1081:Integration
1030:Degradation
1015:Compression
995:Archaeology
980:Acquisition
809:Informatica
747:Google Blog
409:Privacy law
299:, prepaid,
36:data breach
32:cyberattack
1830:Categories
1772:Panopticon
1395:California
1270:Principles
1211:Validation
1146:Publishing
1136:Processing
1106:Management
1020:Corruption
1010:Collection
865:2022-11-03
840:2022-11-03
690:2022-11-22
685:Q115346857
553:. Fortanix
490:2022-11-03
457:References
429:Smart card
318:Safeguards
269::2013 and
245:Since the
63:encryption
61:refers to
1737:Anonymity
1573:Financial
1550:Workplace
1540:Education
1449:Indonesia
1419:Australia
1375:Sri Lanka
1370:Singapore
1315:Australia
1216:Warehouse
1181:Scrubbing
1161:Retention
1156:Reduction
1111:Migration
1086:Integrity
1054:Transform
1005:Cleansing
757:12 August
1815:Category
1730:See also
1583:Facebook
1578:Internet
1530:Consumer
1504:Thailand
1186:Security
1176:Scraping
1151:Recovery
1025:Curation
990:Analysis
884:Archived
814:27 April
767:cite web
751:Archived
741:(2008).
709:Archived
681:Wikidata
650:Archived
624:Archived
585:archived
330:See also
79:hardware
71:software
28:database
1593:Twitter
1545:Medical
1535:Digital
1454:Ireland
1439:Germany
1424:Denmark
1350:Germany
1340:England
1335:Denmark
1263:Privacy
1196:Storage
1171:Science
1166:Quality
1096:Lineage
1091:Library
1066:Farming
1049:Extract
1035:Editing
890:1 March
715:29 July
656:29 July
630:1 March
536:5470548
414:Raz-Lee
301:e-purse
236:holiday
221:In the
169:Backups
158:Backups
147:viruses
123:PKCS#11
1588:Google
1509:Turkey
1494:Sweden
1479:Poland
1469:Norway
1434:France
1365:Russia
1325:Canada
1320:Brazil
1116:Mining
1076:Fusion
683:
534:
524:
297:credit
225:, the
164:Backup
151:hacker
105:could
103:hacker
1777:PRISM
1600:Email
1523:Areas
1489:Spain
1444:India
1355:Ghana
1330:China
588:(PDF)
577:(PDF)
532:S2CID
293:debit
101:or a
81:(see
77:) or
73:(see
34:or a
1716:NOYB
1206:Type
1101:Loss
1059:Load
969:Data
892:2016
816:2018
773:link
759:2011
717:2016
658:2016
632:2016
559:2022
522:ISBN
310:The
287:The
280:The
1568:Law
1044:ELT
1040:ETL
1000:Big
859:ISO
834:ISO
514:doi
127:PIN
1832::
1397:,
882:.
857:.
832:.
807:.
769:}}
765:{{
749:.
745:.
737:,
733:,
707:.
679:.
675:.
648:.
622:.
579:,
530:.
520:.
508:.
482:.
303:,
295:,
223:UK
57:.
38:.
1255:e
1248:t
1241:v
1042:/
961:e
954:t
947:v
894:.
868:.
843:.
818:.
775:)
761:.
719:.
693:.
660:.
634:.
561:.
538:.
516::
493:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.