Current Approaches to Privacy, Part 2