The doctor followed the medical protocol for treating the patient.
The company has strict security protocols in place to protect sensitive information.
The employee was reprimanded for the protocol violation.
The data breach was caused by a violation of protocol.
The software underwent rigorous protocol testing before being released.