What type of security is implemented for entering and storing data?