5.5 Other Security Considerations