Loading...
To know more about this phase of the DPI life cycle, click here.
Click on any process listed below to learn about illustrative practices that can be implemented.
O3.26 Implement strict controls to enforce purpose limitation and restrict secondary data use
O3 Ensure data privacy by design
RS1 Privacy vulnerability,
SV1 Digital distrust