Videos / Article 19 / Guidelines for creating a security protocol