Use and share information in a way that is transparent and benefits the user.
Develop products and advocate for best practices that put users in control of their data and online experiences.
Collect what we need, de-identify where we can and delete when no longer necessary.
Design for a thoughtful balance of safety and user experience.
Defense in depth
Maintain multi-layered security controls and practices, many of which are publicly verifiable.