- Access Limitation: Access to data is only granted to individuals who need it to perform their tasks.
- Encryption: Data is transferred and stored in encrypted format, especially the most sensitive information.
- Firewalls: Installed to prevent unauthorized access.
- Monitoring: Access to computer systems is monitored to detect and prevent misuse of data.
- Data Minimization: Only the strictly necessary data is requested.
- Retention Period Limitation: Data is not retained longer than necessary.
- Integrity and Confidentiality: Strict measures are taken to prevent unauthorized access or misuse of data.


