We use the built-in templates and workflows to make sure we're covering all of the bases when it comes to deleting or accessing a customer's details, as well as notifying them when it's finished. It comes in handy when conducting comprehensive security assessments.