✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Identifying records, authenticating records, administering terms and conditions of access and disposal, tracking and documenting the use of records, enabling retrieval and restricting unauthorised use are examples of: