"Using the code or other information, the base gaming module may be operable to determine the devices and security devices located on the one or more expansion modules using security information stored locally on the base gaming module and adjust its security configuration including its tilt and error handling to account for the security configuration of the one or more expansion modules and any as" . . . .