Most discovery flows work without creating sensitive profiles or collecting precise location data.
Authentication and account data are protected through managed security controls and restricted operational access.
Data is kept only for service operation, legal obligations, or security investigations, then removed.