Computer Security for NGOs
Little Web Giants
FEBRUARY 17, 2015
It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. As we collect more data, in more forms, and in more locations, it becomes increasingly hard to safely manage. Think of it as herd immunity from surveillance.”.
Let's personalize your content