Part 1 The protections from the security software must continue