Another angle: The role of technology in making such leaks possible. How does the infrastructure that stores personal data contribute to these breaches? What steps can be taken to prevent them?