The described embodiments relate to data security. One exemplary system
includes a first component associated with data on which an action can be
performed and a second component configured to perform the action on the
data. The system also includes a third component configured to ascertain
the action and determine, as a function of the action, at least one
policy to be implemented prior to allowing the second component to access
the data.