The decision established a controversial concept of a “Right to be Forgotten,” significantly changing the way search engines will have to operate in Europe.
It’s incumbent upon you as a data curator to know how much you have in the bank so that you can properly assess the measures you need to take to protect it.
More Global Practices Posts
The best way to handle a data breach is with a methodical and practiced incident response plan and a commitment to helping the affected consumers protect themselves from identity theft and fraud.
Could it be that people are both increasingly inviting brands in and therefore more sophisticated about what they expect?
Keeping track of higher education cybersecurity threats is imperative to protect the integrity of institutional assets, the network and infrastructure.
The goal is to help employees understand how their actions online directly impact your business’ success or failure.
With much still to be decided in the coming months, our issue experts in Washington, D.C. took a look ahead at how the 114th Congress may deal with a range of issues.
The explosive growth of sharing-economy companies is largely based on a groundwork of trust in other human beings.
Cyber crime has become an extremely sophisticated, global and lucrative business that continues to grow in its prevalence and frequency.
The classic marketing approach of one-way communication feeding the sales funnel is no longer relevant to advanced energy and sustainability professionals.
It’s easy to forget that the retailer is also a victim of data security breaches.
Significant changes by Google, Facebook and Twitter will impact how health care communicators reach target audiences.