Computer Security for NGOs
Little Web Giants
FEBRUARY 17, 2015
It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.
Let's personalize your content