. "become knowledgeable about relevant and explicit security requirements and guidelines upon which their use is conditional; protect the resources under their control, such as access passwords, computers, and data they download." . . .