The Five Steps to Effective Data Protection