This paper approaches data portability from a privacy and data protection perspective, noting there may be flow-on effects on competition and benefits for consumers resulting from a data portability implementation.
This report highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices.