A. To secure the physical vouchers
B. To restrict access to specific voucher types
C. To encrypt voucher data
D. To generate voucher reports