Your organization is considering a partnership with a startup that specializes in rapid application development. Both entities have distinct security protocols. To ensure a smooth collaboration, what should be the PRIMARY concern when establishing joint security protocols?