Blue Flower

Accountability

Privacy by design

Privacy by default

Reasonable effort

High Risk

Risk based approach

Legitimate interest

DPIA

Security

Hashing

Crypto