-
The Rule also requires operators to retain children's personal information for only as long as is reasonably necessary, and to protect against unauthorized access or use while the information is being disposed of.
ENGADGET: FTC introduces changes to Children's Online Privacy Protection Act, parental permission now required to collect information
-
Furthermore, You must take appropriate steps to protect such data from unauthorized use, disclosure or access by third parties.
FORBES: Congress Has More Questions over Apple iPhone Privacy
-
Make sure you protect access to your device with a password or PIN to keep intruders out if the device is lost or stolen.
FORBES: The Pros And Cons Of 'Bring Your Own Device'
-
As customers rarely have equal access to information or legal talent, they fail to protect their interests.
ECONOMIST: With-profits funds
-
By enabling a security architecture centered on data control, IT solves longstanding security problems through empowering the environment to protect sensitive data regardless of access method, device, network, ownership or location.
FORBES: Virtualization: A Solution For The Tablet Security Conundrum
-
Local officials go to great lengths to protect companies on their patch, often by giving them preferential access to land or credit, or by easing bureaucratic constraints for them.
ECONOMIST: Selling foreign goods in China