Identify what personal data you have and where it resides
Govern how personal data is used and accessed
Establish security controls to prevent, detect and respond to vulnerabilities and data breaches
Execute on data requests, report data breaches and keep required documentation