Technology ❯ Cybersecurity ❯ Data Breaches ❯ User Data Protection
It has enlisted cybersecurity specialists to strengthen data retention protocols