You can:
influence, challenge and coach others anticipate how constraints might change and know where to challenge or remove constraints demonstrate a very strong knowledge of security and data privacy describe and work within environmental constraints, finding the most appropriate solution for users