As we've seen, if the information is retained, it will be used.
The only safe approach is for that information not to exist in the first place.