Before your privacy design review, analyze your threat model to identify any PII that you store or transfer. Summarize the privacy aspects of your software in a detailed analysis.

Describe the PII you store or data you transfer:  

 

Describe your compelling user value proposition and business justification:

 

 

Describe any software you install or changes you make to file types, home page, or search page:

 

 

Describe your notice and consent experiences:

 

 

Describe how users will access your public disclosure: