Technology ❯ Data Privacy ❯ Data Breaches ❯ Mobile Applications
It has enlisted cybersecurity specialists to strengthen data retention protocols