Resources

Data Security in IT Asset Disposition (ITAD): Protecting Your Digital Footprint

Data Security in IT Asset Disposition (ITAD): Protecting Your Digital Footprint

In today’s rapidly evolving digital landscape, data security has become a paramount concern for businesses and individuals alike. As technology advances and businesses frequently update their IT infrastructure, the responsible and secure disposal of obsolete or retired assets becomes essential. This is where IT Asset Disposition (ITAD) comes into play, providing a structured process to

Read More
4 Reasons Shredding Confidential Documents is Crucial to your Business

4 Reasons Shredding Confidential Documents is Crucial to your Business

Every business has a secure way of storing its confidential documents. While some businesses embrace technology and opt to store their documents digitally, some opt to use hardcopy files while others prefer to use both. However, when it comes to data destruction, the method of storage of the data is of little concern. What matters

Read More
Malaysian Airlines is Breached

Malaysian Airlines is Breached

Malaysia Airlines has confirmed it has suffered a “data security incident” via a third-party IT service provider. The company also said the breach had not affected its carrier’s core IT infrastructure and systems. According to Channel Asia, the airline said the incident had occurred at some point during a nine-year period between March 2010 and

Read More
Malaysia Personal Data Protection Act 2010 – 7 Key Principles (Part 2)

Malaysia Personal Data Protection Act 2010 – 7 Key Principles (Part 2)

In the second part, we’re going to discuss those seven key principles in detail, which Malaysian businesses (referred to as data user) must be familiar with to ensure compliance: 7 PDPA 2010 Principles Businesses Must Know A data user must comply with the following seven Malaysian PDPA principles: General Principle Under this principle, data users

Read More
Call Now Button