This part explains how we use and defend sensitive information