Table of Contents Title and Copyright Information Security Considerations Authentication: How Users Sign On Authorization: What Users can Access Machine Learning Security Considerations Endpoint Security Inherent Risks and Practical Policies Privacy and Personal Information Some Security Basics Integration with Other Applications Establishing Security Contacts