I accept receiving promo codes and other educational info from this company.
Get My Code
Number of Pages 8
In eight pages the ways in which personal privacy can be compromised through the accessing of data processing records are examined in terms of regulatory measures with their strengths and weaknesses evaluated. Four sources are cited in the bibliography.
File: TG15_TGdppriv.rtf
Send me this paper »
« Back to Topic Listings