Technology ❯Data Privacy ❯Data Breaches ❯Public Data Exposure
It has enlisted cybersecurity specialists to strengthen data retention protocols