A user is presented with multiple modes of operation, such that the
multiple modes of operation define different trust options for handling
data (such as login credentials or other sensitive data) associated with
the user. A selection of one of the multiple modes of operation is
received from the user. Data associated with the user is handled in
accordance with the selected mode of operation.