Computer system in which the hardware, software, and operational procedures together provide a reasonable (1) security from intrusion, misuse, and unauthorized access, (2) degree of availability and functionality, and (3) adherence to accepted security practices.