How to Classify and Protect Sensitive Data