Three Perspectives on DSEEP and Security