3 Ways of How to Protect Data from Leakage