You can request copies of your data, correct inaccuracies, move it to another service, or request deletion, subject to legal limits. Knowing these rights makes conversations with vendors clearer and timelines realistic. Pair rights with practice: pull exports quarterly and document how identities, attachments, and tags travel. Rights shine brightest when exercised and validated, not merely admired in a policy page’s courteous fine print.
Which fields are encrypted at rest and in transit? Is metadata minimized? How do exports preserve structure and backlinks? Can I self-host or use WebDAV? What is the incident response timeline? Are third-party auditors involved? Concrete answers, plus testable demos, separate aspirational security from dependable stewardship that earns trust through clarity, repeatability, and a bias toward giving control back to the rightful owner—you.
Cloud sync often spans jurisdictions, each with unique privacy rules. Confirm where data resides, how transfers are protected, and who can compel access. Prefer regional controls and clear subprocessor lists. If you collaborate globally, align retention schedules and classify sensitive notes carefully. Geography becomes a setting, not a surprise, when you map flows deliberately and choose partners that respect sovereignty and long-term portability.