How should sensitive information be handled?