Field level security and visualisations

I found this article - does this make sense to you?