Understanding How to Implement Privacy by Design, One Step at a Time