Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

3.3.1. Data Collection, Location, and Maintenance

💡 First Principle: Data that is never collected cannot be breached. Privacy by design — baked into Domain 3's secure design principles and every privacy regulation — starts with data minimization: collect only what you need, for the specific purpose you've defined, for no longer than necessary.

Data collection principles (drawn from GDPR and common privacy law):
PrincipleDefinitionSecurity Implication
Purpose limitationCollect data only for a specific, explicit, legitimate purposeCannot repurpose collected data without new legal basis
Data minimizationCollect only what is necessary for the stated purposeCollecting less data = less breach exposure
AccuracyMaintain data in an accurate, up-to-date stateInaccurate data creates legal and operational risks
Storage limitationDon't retain data longer than necessaryRetention schedules must be defined and enforced
Integrity and confidentialityProtect data using appropriate technical/organizational measuresClassification drives the specific measures required

Data location and sovereignty — where data physically resides creates legal obligations:

  • Data residency: Some regulations require data to stay within specific geographic boundaries (EU GDPR, Russian Federal Law 242-FZ, China PIPL). Cloud deployments must honor residency requirements.
  • Data sovereignty: The jurisdiction where data is stored determines which laws apply to it. US cloud providers storing EU data in EU data centers may still be subject to US government access requests (CLOUD Act).
  • Multi-tenancy risks: Cloud shared storage means your data coexists with other customers' data. Logical separation must be verified; regulatory requirements may require dedicated storage.

Data maintenance — keeping data accurate and current:

  • Inaccurate personal data creates GDPR exposure (right to rectification)
  • Inaccurate financial data creates SOX exposure
  • Stale access control data (people who've left but retain access) is an insider threat risk

⚠️ Exam Trap: "Data location" on the CISSP means physical storage location (which jurisdiction, which data center) — not logical location (which database, which folder). The physical location determines sovereignty, residency compliance, and government access authority. Knowing only the logical location is insufficient for compliance.

Reflection Question: A US-based company processes EU customer orders through a CRM system. The CRM vendor stores data in US-based data centers with no EU option. The company's legal team has approved Standard Contractual Clauses. Is this arrangement legally compliant? What residual risk exists, and what would eliminate it?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications