6 Balancing Security and Access for increased algorithmic integrity