How to protect data part 1/2