The EU directive NIS2 has been announced officially. Find out here whether your company is affected and what you need to do now.
In today's digital world, a company's online presence is an essential component of effective marketing. It has become common practice to publish employee photos on the homepage and in social networks in order to introduce one's company.
Our colleagues Simon Pentzien, MBA and Daniel Lösch dealt with individual aspects of the Corona warning app in the current issue of Data Protection Advisor. They come to the conclusion that the Corona warning app has been well implemented in terms of data protection law. Nevertheless, there is a need for optimisation. If you are
A large proportion of European companies transfer personal data to the USA. The most important basis for this was the Privacy Shield Agreement between the EU and the USA.
A few years ago, the use of video conferencing systems was still the exception. In the meantime, video conferencing systems have become an indispensable part of everyday business for many companies. Since video conferencing involves the processing of a large amount of personal data, specific data protection requirements need to be observed.
Brexit is drawing closer. Companies should take action to ensure that compliance with data protection rules is guaranteed with the end of the transitional phase.
National borders hardly matter any more in the age of the World Wide Web. Knowledge can be accessed around the clock. Sellers are free to offer their goods to the whole world, and users have an almost endless choice of available content.
The data protection organisation Noyb launches a wave of cease-and-desist letters against cookie banners. More than 500 cease-and-desist letters have already gone out and another 10,000 are to follow.
The EU directive NIS2 has been announced officially. Find out here whether your company is affected and what you need to do now.
CEO fraud is another version of “social engineering” in which the perpetrators target the often weakest link in the IT security chain: The people. It has become harder to obtain confidential information by “classic” means, such as hacking, as a result of ever-improving technical protection measures, ranging from a simple firewall to encryption methods.
I have always been interested in the interface between IT and law. In other words, the technical and socio-political developments that force us to change our law. When the fathers of our constitution wrote the first 20 Articles of the constitution, it was not yet foreseeable that we would eventually post every meal on Instagram.