In useful phrases, you ought to lower entry to sensitive knowledge and build anonymized copies for incompatible functions (e.g. analytics). It's also wise to doc a intent/lawful foundation prior to gathering the info and communicate that function to your consumer within an suitable way. Confidential computing addresses this gap of preserving knowl… Read More