Security - must provide users with unique IDs and password and their distribution must be secure. Encryption keys are used to allow for sender and receiver communication but minimizing risk of a third party intercepting sensitive information. In addition there should be security attached to UserIDs that allow access only to qualified levels identified at time of entry.