Data Privacy: The “How” Behind the “What”