How to protect data part 2/2