This means that securing optimal consumer data protection is possible only in so far as search engines and database operators are able (or willing) to implement such protections.
With the right tools, an IT administrator can assure that only authorized personnel see company data by securing all the devices accessing company networks.