version:

Privacy and confidentiality can be protected by keeping data in source locations, on-premise, behind the corporate firewall, on corporate storage assets, in specific geographic regions and access controlled.