Last Updated: November 21, 2025
Principles
| Principle | Action |
|---|---|
Minimize
|
Collect only needed data |
Purpose
|
Be transparent |
Security
|
Encrypt & monitor |
Resilience
|
Plan retention |
Commands
encrypt --all
Enable encryption
group policies
Limit access
audit logs
Record access
Guidance
Combine privacy and security reviews, involve privacy leads, and document DPIAs.
💡 Pro Tip:
Map data flows, encrypt in transit+rest, and provide consent controls.