Addition, information technology security protection will be affected by features or functionality associated with, among other things the e-mail platform, master data management, and virtual private network solutions selected by the software provider