1.5 What is data sovereignty and how is it achieved?

Access is restricted.