When simulated data and system functions are displayed or provided (perhaps for user training), real data should be protected and real system use should be clearly distinguished from simulated operations.