A key theme of this work is to answer the key question "Can we use IBM’s solutions to develop various privacy law complainant applications?".