When done right, it is possible to ramp up security and clamp down on breaches without compromising the user's right to privacy.