How do we manage sensitive data in a system?