C.3 Other Security Considerations