When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed to implement: