7. Understanding the detail of your research security features