As a concrete example, systems that provide practical information flow control could be developed and deployed to allow sensitive data such as credit card numbers or email addresses to be tagged as such, and prevented from being transmitted over the network.