Law ❯ Privacy Law ❯ Data Protection ❯ Legal Risks
It has enlisted cybersecurity specialists to strengthen data retention protocols