We've covered a lot in this module. What does it all mean for you as a business professional? Let's use a real-world example to demonstrate the high-level steps you may need to take to reassess your data security and privacy practices. I'll also highlight how these steps can help you use Cloud technology to support your role in your transformation journey. We'll start with an example common to every organization. Imagine you work in human resources and you're in charge of hiring personnel across the organization. What steps would you need to take to ensure the data associated with your day-to-day tasks is kept private and secure when using Cloud technology? Here are the steps at a high level. Number one, identify the data categories or data buckets that apply to your information. For example, user or customer data, corporate data or industry market data. Number two, after you categorize your data, classify each bucket by sensitivity level. Customer or user data is typically highly sensitive. Employee data such as salaries, social security numbers, and addresses are probably the most sensitive, and should only be accessed by authorized personnel. Other corporate data will probably still be sensitive, but authorized access to it might be wider within the company. Industry data such as trends and salary packages for example is public and access to it might not be restricted at all. Number three, there may be regulations around the security and privacy of each data category that you need to comply with. If you work in a regulated industry such as banking or health care, you'll need to consult with your risk department for more specifics on this. Number four, list the general or specific roles within your organization that will need access to the data you've identified. Number five, for each role determine access controls for the data. We recommend that you work with someone from your risk department to understand that you've follow these steps correctly. Where Google Cloud can transform the way you work, is by streamlining many of these steps outlined here. For example, you can use Cloud technology to create separate storage areas and then assign specific access rights to each storage area by role. Cloud Identity and Access Management or IAM would allow you to assign fine-grained access control. Organizations are constantly collecting new data and manually classifying and organizing that data would be tedious. In our HR example, as new candidate applications come in, you could use the data loss prevention or DLP API to preemptively classify and redirect sensitive data to the right storage area without manual effort. You could also use the DLP API to anonymize or redact sensitive candidate information. For example, ethnicity or gender that you might not want to share with the interviewer. Throughout the whole process, you can minimize internal risks to privacy and security, by working with your internal security team to prevent changes to access permissions for anyone handling the data. In other cases, you may need to rethink the way you've been applying security practices or policies. One such example, is a regulation your organization might need to comply with, the company must have full control of its data at all times. The absence of a clear definition, the term full control has led to a very narrow or literal approach to data security that the data cannot leave an organization's on-premise data center. However, you can still maintain full control even when your data is stored in the cloud. If you migrate your data to Google Cloud, you will know the location of all of your data with Cloud storage services. You can control user access appropriately with Cloud Identity and Access Management or IAM. You can ensure that there are detailed audit logs of all activity. You can monitor and track sensitive data and automatically redact it with a Cloud Data Loss Prevention API. This gives you full control. As part of Google Cloud's commitment to transparency with the systems we have in place, we can help provide you with the evidence of accountability to any internal or external auditor. For more practice, refer to the student exercise to help you review the steps I've covered for your specific activity. If you're using Cloud technology or plan to, it would be your responsibility to communicate the business requirements to your security teams for them to implement. Naturally, investing the time in advance to understand the requirements for privacy, security, availability, and compliance with Cloud technology, will better prepare you to address the challenges along your transformation journey, and also help you benefit from the opportunities it offers as you build a comprehensive security program.