8-6 Retaining Security Information