THE EVOLUTION AND ADVANTAGES OF SENSIBLE ACCESS COMMAND TECHNIQUES