Law ❯Data Protection ❯Privacy Laws ❯User Rights
It has enlisted cybersecurity specialists to strengthen data retention protocols