Specific processing situations, Surveillance
Certification, Controllers and Processors
Face Analysis
Data Retention, Legitimate Interest, Storage limitation
Data Spaces, Risk Management