. . . "s against attempted access to data or services available at the token other than the data or services made available in the legacy environment.09-18-2008" . . . .