A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging in that include biometric scans so they can ensure only authorized programmers have access to the code. What is this an example of?

This is an example of an authentication system, which is a security measure used to verify the identity of a user or program before granting access to a system or resource.