THE EVOLUTION AND BENEFITS OF SENSIBLE ACCESS COMMAND TECHNIQUES