6 Critical Steps for Scaling Secure Universal Data Authorization