Data exposure should use the following rules:


In terms of exposure method: