...
- Strong password authentication and authorization
- Role based security to limit access to certain data elements
- Encryption of data in transit using HTTPS.
- Encryption of data at rest by encrypting the database server disk
Support for removing personal information
...