The database is where most privacy breaches occur. Several steps can be taken to limit the risk of exposure of sensitive data, including removing the sensitive data before it is stored in a database or limiting access to it after it is stored in the database. This is part of the minimization principle that should be applied to data throughout its lifecycle. That is, minimize the data that you collect, minimize access to the data, and minimize the amount of time that you keep the data.
The types of protection you can use to protect data in a database include the following:
Data perturbation ...