Understanding Data Security Profiles