Share Facebook Twitter LinkedIn Pinterest Email Proposals include encrypting data so it cannot be accessed, even if leaked, and requiring compliance checks to ensure networks meet cybersecurity rules