Implement privacy-by-design, conduct DPIAs where relevant, use encryption and access controls, and apply human oversight. Define policies for training data and generated outputs.