Controls are ineffective without user cooperation

...and security, access-controls, etc. have to have a transparency
and ease-of-use factor such that legitimate users don't actively
attempt to bypass it themselves. :slight_smile:

- ferg