From the following list, identify the technology aspects that are specially designed for upholding privacy:
I) Data minimization
II) Intrusion prevention system
III) Data scrambling
IV) Data loss prevention
V) Data portability
VI) Data obfuscation
VII) Data encryption
VIII) Data mirroring
Rachael
3 months agoBen
3 months agoSommer
3 months agoYoko
4 months agoLavera
4 months agoPamella
4 months agoCarmela
4 months agoSon
4 months agoEdgar
5 months agoEssie
5 months agoMarguerita
5 months agoBarrett
5 months agoAnnette
5 months agoShantay
5 months agoAnisha
1 year agoGussie
1 year agoClaribel
1 year agoJacquline
1 year agoHyman
1 year agoGail
1 year agoGlynda
1 year agoClement
1 year agoCraig
1 year agoBenedict
1 year agoCarolann
1 year agoEvelynn
1 year agoAzzie
1 year agoReita
1 year agoAriel
1 year agoAlpha
1 year agoBillye
1 year agoKris
1 year agoHelaine
1 year agoVilma
1 year agoCeola
1 year agoLelia
1 year agoYolande
1 year agoAvery
1 year agoDemetra
1 year agoVerlene
1 year agoDemetra
1 year agoMarg
1 year agoRobt
1 year agoJudy
1 year agoGilberto
1 year agoGracia
1 year ago