Data security key



FIG. 1 is a perspective top view of a data security key.

FIG. 2 is a perspective bottom view of the data security key.

FIG. 3 is a left side view of the data security key.

FIG. 4 is a right side view of the data security key.

FIG. 5 is a rear side view of the data security key.

FIG. 6 is a front side of the data security key.

FIG. 7 is a top view of the data security key; and,

FIG. 8 is a bottom view of the data security key.

The components shown in broken lines form no part of the claimed design.

CLAIM The ornamental design for a data security key, as shown anddescribed.