The background of Data Protection part 2