Subject Access Requests are a component of data management introduced in The GDPR and DPA 18.
This blog will go into more detail on what SARs are, how they can be requested and how you should respond to them.
Continuous research suggests that ‘Insider Threats’ are responsible for around three-quarters of security breaches. There’s little doubt about how detrimental this type of threat can be to a company and its
Email is one of the most convenient and prolific means of business communication. For many, it is just a transient business commodity, but for others, it can be mined to produce powerful business intelligence.