Return to Article Details Cross-Border Data Security: Analysis of High-Profile Violations and Mitigation Strategies Download Download PDF