Magazine

IT-Security
29.10.2022
Reading time 10 minutes
Catch me if you can – How to protect yourself from CEO fraud

CEO fraud is another version of “social engineering” in which the perpetrators target the often weakest link in the IT security chain: The people. It has become harder to obtain confidential information by “classic” means, such as hacking, as a result of ever-improving technical protection measures, ranging from a simple firewall to encryption methods.

Read more
29.10.2022
Reading time 10 minutes
Compensation for unauthorised publication of an employee photograph on Facebook

In today's digital world, a company's online presence is an essential component of effective marketing. It has become common practice to publish employee photos on the homepage and in social networks in order to introduce one's company.

29.10.2022
Reading time 10 minutes
Corona-Warn-App and reference to individuals: A critical view

Our colleagues Simon Pentzien, MBA and Daniel Lösch dealt with individual aspects of the Corona warning app in the current issue of Data Protection Advisor. They come to the conclusion that the Corona warning app has been well implemented in terms of data protection law. Nevertheless, there is a need for optimisation. If you are

29.10.2022
Reading time 5 minutes
Schrems II ruling: Requirements for data controllers in international data transfers

A large proportion of European companies transfer personal data to the USA. The most important basis for this was the Privacy Shield Agreement between the EU and the USA.

29.10.2022
Reading time 7 minutes
Face-to-face via video conference

A few years ago, the use of video conferencing systems was still the exception. In the meantime, video conferencing systems have become an indispensable part of everyday business for many companies. Since video conferencing involves the processing of a large amount of personal data, specific data protection requirements need to be observed.

29.10.2022
Reading time 15 minutes
Top 7 Brexit data protection to-dos

Brexit is drawing closer. Companies should take action to ensure that compliance with data protection rules is guaranteed with the end of the transitional phase.

29.10.2022
Reading time 10 minutes
The scope of the GDPR in an international context - or: Does the GDPR have limits?

National borders hardly matter any more in the age of the World Wide Web. Knowledge can be accessed around the clock. Sellers are free to offer their goods to the whole world, and users have an almost endless choice of available content.

29.10.2022
Reading time 10 minutes
Wave of cease-and-desist letters from Noyb against cookie banners: what's behind it?

The data protection organisation Noyb launches a wave of cease-and-desist letters against cookie banners. More than 500 cease-and-desist letters have already gone out and another 10,000 are to follow.

29.10.2022
Reading time 10 minutes
Catch me if you can – How to protect yourself from CEO fraud

CEO fraud is another version of “social engineering” in which the perpetrators target the often weakest link in the IT security chain: The people. It has become harder to obtain confidential information by “classic” means, such as hacking, as a result of ever-improving technical protection measures, ranging from a simple firewall to encryption methods.

29.10.2022
Reading time 10 minutes
Japan and an idea – an interview with Niklas Hanitsch

I have always been interested in the interface between IT and law. In other words, the technical and socio-political developments that force us to change our law. When the fathers of our constitution wrote the first 20 Articles of the constitution, it was not yet foreseeable that we would eventually post every meal on Instagram.