Developed for both product management and software design teams, this talk introduces all the aspects that need to be considered for the whole lifecycle of a secure and privacy-compliant product. It is informed by the many omissions and gaps seen during implementation and support of both the computers themselves and the applications deployed to them.