Technology ❯ Data Privacy ❯ Data Breaches ❯ Public Data Exposure
It has enlisted cybersecurity specialists to strengthen data retention protocols