List Security?An Evolution and an Imperative