Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
3. Use available technology to guard personal data. Build structural and technological walls to contain personal information, and run tests to ensure the system works. Make contingency plans.
4. Inform data suppliers and business partners of their responsibilities to meet your security specifications. The information chain is only as strong as its weakest link. Make sure personal data in your care are “tagged” and”fenced” when they enter your database, while they’re in storage and once they leave. Permit no information transfers without ensuring business partners meet your security standards.
0 Comments
View Comments
- Companies:
- Direct Marketing Association
Related Content
Comments