Accountability
Privacy by design
Privacy by default
Reasonable effort
High Risk
Risk based approach
Legitimate interest
DPIA
Security
Hashing
Crypto