With the help of a security officer, granting access to data is the responsibility of:
A.
data owners.
B.
programmers.
C.
system analysts.
D.
librarians.
Explanation:
Data owners are responsible for the use of datA . Written authorization for users to gain access to computerized information should be provided by the data owners. Security administration with the owners’ approval sets up access rules stipulating which users or group of users are authorized to access data or files and the level of authorized access (e.g., read or update).