- Apply DLP restrictions and configurations to systems and networks to ensure sensitive data cannot be maliciously or accidentally leaked to unauthorised third parties
- Establish alerting mechanisms to prompt appropriate investigations and mitigations in the event of a possible breach of confidentiality or security standards