From the following list, identify the technology aspects that are specially designed for upholding privacy:
I) Data minimization
II) Intrusion prevention system
III) Data scrambling
IV) Data loss prevention
V) Data portability
VI) Data obfuscation
VII) Data encryption
VIII) Data mirroring
Rachael
4 months agoBen
5 months agoSommer
5 months agoYoko
5 months agoLavera
5 months agoPamella
6 months agoCarmela
6 months agoSon
6 months agoEdgar
6 months agoEssie
6 months agoMarguerita
6 months agoBarrett
6 months agoAnnette
6 months agoShantay
6 months agoAnisha
1 year agoGussie
1 year agoClaribel
1 year agoJacquline
1 year agoHyman
1 year agoGail
1 year agoGlynda
1 year agoClement
1 year agoCraig
1 year agoBenedict
1 year agoCarolann
1 year agoEvelynn
1 year agoAzzie
1 year agoReita
1 year agoAriel
2 years agoAlpha
2 years agoBillye
2 years agoKris
1 year agoHelaine
1 year agoVilma
1 year agoCeola
2 years agoLelia
2 years agoYolande
2 years agoAvery
2 years agoDemetra
2 years agoVerlene
2 years agoDemetra
2 years agoMarg
2 years agoRobt
2 years agoJudy
2 years agoGilberto
2 years agoGracia
2 years ago