13. Security considerations