These are methods to ensure data is not leaked. Restrictions Geographical Restrictions Encryption Hashing Data Masking Tokenization Obfuscation Obfuscation Network Segmentation Permissions