GDPR

Media Retention – a step towards GDPR compliance!

Share this post:

In the eve of the new GDPR legislation, it is more important than ever to make your customer data your top priority. With IBM’s Media Retention service you have greater control over sensitive data by helping you keep your failed media components.

With Media Retention you can better manage regulatory compliance to avoid GDPR related penalties. It is even a requirement for many organizations to keep hold of their defective media components containing sensitive data. Have you checked if this a requirement for your company?

So in a nutshell, Media Retention is exactly what it says on the tin – you get to keep your defective media and rest assured you have the full control of your customers’ sensitive data.

Contact your account manager or your preferred business partner to get a quote and more information now!

For more information reach out to one of our technology support specialists in your country:

Denmark
Antje Wagner
+45-4524 7542
antje.wagner@ie.ibm.com

Finland
Sofia Tuomola
+358-9459 5849 (Office)
Sofia.Tuomola@ibm.com

Norway
Lars Hintze-Holm
+47-66998525
Lars.Hintze.Holm@ibm.com

Sweden
Moa Stjerndahl
+46-8793 6063
Moa.Stjerndahl@ibm.com

For any further questions do not hesitate to contact me at SKOVBORG@dk.ibm.com

HW offering manager Nordic - Technical Support Services GTS,TSS

More GDPR stories

WHAT IF… you could use Deep Learning for new business opportunities

You may think, that deep learning is mainly for nerds in universities and small start-up companies. Not true. Reality is that you will have a hard time finding any industry with no presence of companies doing Deep Learning activities. Admitted, in some market segments it is more common than in others, but no matter the […]

Continue reading

30 Years of Innovation and we’re just getting started.

June 21. 1988 was the birth of the longest living server on the planet. It was born in Rochester, Minnesota US – and the codename was taken from the local water pond: Silver Lake. Officially it was called AS/400 with the Operation System named OS/400. The AS/400 was the follow-on server of the midrange server […]

Continue reading

4 Ways to protect your Crown Jewels

For today’s generation, there is arguably no greater challenge than cybercrime. From stealing private information and damaging reputations to crashing critical infrastructure and putting enterprises at risk, today’s cybercriminals are testing the limits of security and resiliency. If you step back and think about it, the list of potential perpetrators is daunting in scope. It […]

Continue reading