1 By Daren Dhoray Cyber Security Latest News Protect your Business Protect Your Family 08 Nov: Data Governance and Privacy in the Wake of Cyberattacks: A Closer Look at Data Storage Practices Can PII requested by companies simply be used to verify the identity of a customer and not required to be stored long-term?