1. Demonstrate Secure Use of IT