An it company commissions a new software for Human Resources [HR) management. This new software replaces a legacy software used in the organization for around 20 years. Which of the following security practices are important to prevent data leaks during the decommissioning of the legacy HR software?