Privacy by Design Cheat Sheet

Minimize data, document flows, and encrypt

Last Updated: November 21, 2025

Principles

Principle Action
Minimize Collect only needed data
Purpose Be transparent
Security Encrypt & monitor
Resilience Plan retention

Commands

encrypt --all
Enable encryption
group policies
Limit access
audit logs
Record access

Guidance

Combine privacy and security reviews, involve privacy leads, and document DPIAs.

💡 Pro Tip: Map data flows, encrypt in transit+rest, and provide consent controls.
← Back to Security & Privacy | Browse all categories | View all cheat sheets