Cybersecurity
Controllers and Processors, Data Protection Officer (DPO)
Cybersecurity, Risk Management
Facial Recognition, Specific processing situations
Data Protection Officer (DPO)
Law Enforcement, Local Laws
Cybersecurity, Personal Data Collection
Governance
Data Retention, Legitimate Interest, Storage limitation