De4sec
De4sec Technology
de4sec.technology
๐ŸŒ AU + KE

Data Protection and DLP Guide

How to classify, protect, and control sensitive business data using Microsoft Purview โ€” DLP policies, sensitivity labels, and data governance.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. Why Data Protection Is Now a Business Requirement
  2. Data Classification: Know What You Have
  3. Data Loss Prevention Policies
  4. Microsoft Purview Information Protection
  5. Retention Policies and Compliance
  6. De4sec Data Protection Service
01

Why Data Protection Is Now a Business Requirement

Data protection is no longer just a compliance checkbox. Businesses that mishandle personal or confidential data face regulatory fines, civil claims, reputational damage, and loss of client trust โ€” regardless of whether a breach was malicious or accidental.

In Australia, the Privacy Act 1988 and Notifiable Data Breaches scheme apply to most businesses. In Kenya, the Data Protection Act 2019 (KDPA) creates obligations for any organisation handling personal data. In both jurisdictions, 'we didn't know' is not a defence.

The most common data loss event is not a hacker stealing data. It's an employee emailing the wrong person, uploading to a personal file sharing service, or losing a laptop with unencrypted files.

02

Data Classification: Know What You Have

You cannot protect data you haven't classified. Data classification assigns a label to information based on its sensitivity โ€” and drives what protection controls apply.

ClassificationExamplesProtection Required
PublicMarketing materials, job listingsNone โ€” intended for public access
InternalInternal procedures, meeting notesAvailable to all staff, not for external sharing
ConfidentialFinancial data, contracts, employee recordsRestricted to authorised staff, encrypted when shared
Highly ConfidentialM&A documents, legal privilege, PII datasetsHeavily restricted, logging on all access, encryption required

Microsoft Purview Sensitivity Labels

โœ“Labels applied manually by users, or automatically by content classifiers
โœ“Label-based protection โ€” Confidential documents encrypted, sharing restricted
โœ“Labels follow the document wherever it goes โ€” cloud, email, USB, external sharing
โœ“Available in Word, Excel, PowerPoint, Outlook, Teams, SharePoint
03

Data Loss Prevention Policies

DLP policies automatically detect and prevent sensitive data from leaving the organisation inappropriately โ€” via email, Teams, SharePoint sharing, or browser upload.

What DLP can detect

โœ“Australian Tax File Numbers (TFN)
โœ“Credit card numbers and financial account data
โœ“National identification numbers
โœ“Custom sensitive information types โ€” your own patterns (e.g. employee IDs, project codes)
โœ“Bulk file movement โ€” when unusually large amounts of data are accessed or downloaded

DLP actions

โœ“Block the action โ€” email not sent, upload blocked
โœ“Warn the user โ€” 'this may contain sensitive data, do you want to continue?'
โœ“Require justification โ€” user must enter a reason before overriding the block
โœ“Alert the security team โ€” incident logged for review
โœ“Apply encryption โ€” Confidential email encrypted before delivery

DLP policies in audit mode first โ€” let them run for two weeks to understand false positive rates before enabling block mode. A DLP policy that blocks legitimate work will be disabled or bypassed by frustrated users.

04

Microsoft Purview Information Protection

How it works

โœ“Sensitivity labels applied to documents and emails โ€” either manually or automatically
โœ“Label-based encryption โ€” Confidential documents are encrypted using Azure Rights Management Service
โœ“Encryption follows the document โ€” even if shared externally or downloaded to a personal device, encryption persists
โœ“Access control โ€” only authorised users can open encrypted documents, even if they receive the file

Automatic labelling

โœ“Content-based classification โ€” Purview scans documents for credit card numbers, TFNs, PII patterns and suggests or applies labels
โœ“Trainable classifiers โ€” train Purview to recognise your specific sensitive content types
โœ“SharePoint and OneDrive scanning โ€” classify existing files in SharePoint libraries
โœ“Teams messages โ€” classify and protect sensitive information shared in Teams channels

Monitoring and reporting

โœ“Content Explorer โ€” see all classified content across SharePoint, OneDrive, Exchange
โœ“Activity Explorer โ€” track who accessed, modified, or shared labelled content
โœ“DLP incidents report โ€” all policy matches, user overrides, blocked actions
05

Retention Policies and Compliance

Data retention is the other side of data protection โ€” not just preventing unauthorised access, but ensuring data is kept for required periods and deleted when no longer needed.

Data TypeTypical Retention Requirement
Financial records (AU)7 years โ€” Corporations Act / tax requirements
Employee records (AU)7 years post-employment (Fair Work)
Personal data (AU NDB)As long as necessary for purpose โ€” then delete
Personal data (KDPA Kenya)Defined retention period required in privacy notice
Health recordsVaries by state/type โ€” consult legal counsel

Microsoft Purview Retention Policies can automatically enforce retention โ€” keeping data for defined periods and triggering deletion or review when the period expires. This reduces the risk of inadvertently holding data longer than legally required.

Legal hold

When litigation or regulatory investigation is anticipated, retention policies can be overridden with legal holds โ€” ensuring data is preserved regardless of normal deletion schedules.

06

De4sec Data Protection Service

Data Discovery
Content Explorer scan of Microsoft 365 tenant โ€” understand what sensitive data exists and where.
Classification Framework
Design sensitivity label taxonomy aligned to your business and regulatory requirements.
Purview Implementation
Deploy sensitivity labels, configure DLP policies, implement retention policies, enable audit logging.
Ongoing Compliance
Monthly DLP incident review, sensitivity label audit, retention policy review, regulatory compliance reporting.
// NEXT STEP

Ready to get started?

De4sec provides hands-on implementation. Book a free discovery call at no cost.

Book a Free Discovery Call โ†’de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.