Enable platform encryption by default and prefer TLS 1.2 or higher for connectors. When exporting, encrypt files before syncing elsewhere. If you must email reports, use password-protected archives with out-of-band key exchange. Test restores periodically to confirm encryption does not break recoverability.
Define lifetimes for every dataset, aligning with consent, contracts, and legal obligations. Implement automated purges so routine cleanup does not rely on memory. Keep deletion logs, but avoid storing content previews. For auditing, retain hashes or counts rather than complete records when possible.
All Rights Reserved.