Computer Security for NGOs
Little Web Giants
FEBRUARY 17, 2015
It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. It’s also a concern if you plan direct action campaigns such as banner drops or protests. That’s good news and bad from a security perspective.
Let's personalize your content