What security considerations should be in place for the church software solution?