Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

Compliance

...Regulations Any EU organisation holding personal data Personal data All major best practice areas Data governance is primarily concerned with the Data Protection Act and privacy regulations. All organisations in...

Post

5 Cyber Security and ISO 27001 Myths

...before the GDPR [General Data Protection Regulation] came into force. If you look back at the UK government’s 2016 and 2017 Cyber Security Breaches Surveys, you’ll see that small businesses...

Post

Data Classification Software

...include the label in the filename, document itself and metadata. Access controls can draw from the labelling, metadata or file structure to permit or deny access to information based on...

Post

GDPR Article 17: What Is the Right to Erasure?

...processor collected the data unlawfully; The data must be erased to comply with a legal obligation; or The data was processed in relation to the offer of information society services...