To meet security requirements before gaining access to data, a computer operator supplies