End-to-end encryption generally protects both confidentiality and integrity.
en.wikipedia.org The secretive names were chosen because of the high confidentiality of the project during the initial planning.
en.wikipedia.org Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability).
en.wikipedia.org Companies can mitigate these risks by requiring waivers of liability, audit trails, certificates of data destruction, signed confidentiality agreements, and random audits of information security.
en.wikipedia.org The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
en.wikipedia.org