The client previously experienced an unintentional disclosure of personally identifiable information and had to pay large fines due to this breach. John and Jin are designing a proposal to help the client automate a data protection process to avoid situations like this in the future. Thinking about Privacy by Design and how they can build layers of protection, Jin recommends two data masking methods: encryption and data nulling