Specific processing situations, Surveillance
Face Analysis
Cybersecurity, Personal Data Collection
Data Retention, Legitimate Interest, Storage limitation
Data Spaces, Risk Management