Issues ranging from access control to hardware to special protective measures associated with information may all need to be implemented.