Before your privacy design review, analyze your threat model to identify any PII that you store or transfer. Summarize the privacy aspects of your software in a detailed analysis.
Describe the PII you store or data you transfer:
Describe your compelling user value proposition and business justification:
Describe any software you install or changes you make to file types, home page, or search page:
Describe your notice and consent experiences:
Describe how users will access your public disclosure: