Email:

Phone No.

Whatsapp

Category: Resources

Changes to the access and correction obligations you should know
Changes to the access and correction obligations you should know
Changes to the access and correction obligations you should know
Changes to the access and correction obligations you should know

Changes to the access and correction obligations you should know

Changes to the access and correction obligations you should know Currently, an organization is required to offer an individual with: (a) personal data on the individual that the organization has in its possession or under its control, and (b) information on how the personal data referred to in paragraph (a) was or may have been

6 common phishing attack examples and how to protect against them

The number of phishing efforts to deceive users into giving up personal information nearly tripled last year compared to the previous year, and more than doubled during the months when individuals were forced to stay at home to combat the spread of Covid-19. The Cyber Security Agency of Singapore (CSA) revealed this in its newest

Guarding against common types of data breaches in Singapore

A cyber-attack is a real possibility. Cyber-attacks have increased dramatically in the last year, particularly with remote working due to the COVID-19 epidemic. The Cyber Security Agency of Singapore released its 2020 report on July 8, 2021, reporting a 154% increase in recorded ransomware attacks – a total of 89 cases compared to 35 in

Upholding privacy by design principles: Why does it matter?

Upholding Privacy by Design principles Privacy by Design is a framework that focuses on incorporating privacy into the Design and operation of IT systems, networked infrastructure, and business activities from the beginning of the project. It is an approach applied when creating new systems and technologies. With this, privacy is incorporated into the technology and

× Chat with us