The Meeting Network
If confidential data resides on an on-site meeting network or in a registration database, it's the planner's responsibility to protect it. Here are security best practices from a technical perspective.
Rampant Identity Theft and credit card fraud have raised awareness that personal information must be protected. But as fast as changing technology provides new ways to share data — from secure wireless networks to voice-over-Internet cell phones — hacker