Security Limits Used in HAP