Data Security: how to implement LLM safely