Before your privacy design review, analyze your threat model to identify any PII that you store or transfer. Summarize the privacy aspects of your software in a detailed analysis.

Describe the PII you store or data you transfer:  


Describe your compelling user value proposition and business justification:



Describe any software you install or changes you make to file types, home page, or search page:



Describe your notice and consent experiences:



Describe how users will access your public disclosure: