Principles, Purpose limitation
Controllers and Processors, Data Breaches, Principles, Sensitive Data, Storage limitation, Technical and Organisational Measures (TOMs)
Controllers and Processors, Principles, Purpose limitation, Representative