Data Breach: What to Do When You’re Attacked

It's critical, in this data-soaked world, to keep your data secure. Confidential delegate or employee details, such as names, addresses and even biometric details, need to be under lock and key - with access granted only to those who really need it. Whether you're using spreadsheets or dedicated software for training companies, the rules around the data you hold on delegates, and how you use it, are about to change.

Read the full story by

Tags:

RELATED READS
The accessplanit 2017 Round-up Understanding the Difference Between AI and Automation
We are updating our Privacy Policy, so please make sure you take a minute to review it. As of May 25, 2018 your continued use of our services will be subject to this new Privacy Policy.
Review Privacy Policy OK