The security protocols put in place to protect the database led to the loss of 1010's life.
"How did the bombs get through all of our security protocols, Commander?"
Those are, as I say, nothing about which security protocol you're using.
Feel free to go where you choose, barring standard security protocols.
In that case, she would be able to study how the security protocols were designed.
Her next project can be to redesign the security protocols.
Why didn't you think she could break the security protocols?
The security protocol was the worst thing about this task.
What did it take to determine if security protocols had been violated?
Now, looking at the protocol, it's a - we've talked about the way security protocols work in the past.