Sensitive and personal data storage

Data storage location requirements

Data storage distribution

Encryption

Third party access