When it comes to data security, all parties involved need to work together. Even after you’ve done your work, it’s important to stay tuned. Simply shifting the responsibility to the IT department will not be enough. People are creative and that is why entrepreneurs has to be clear that they bears the responsibility and also… […]
Proper handling of patient inquiries
The response to data subject requests must not only include the information you have stored about the requesting person, but also information about WHY you process the data, how long the data is stored, and information about the rights of the data subject (see Art. 15). The information may not affect the rights and freedoms… […]
Expert tip: How to avoid a Data Breach in your business!
Negative press can trigger a flood of inquiries as a result of a reported data breach. Take action to prevent a data breach in your organization. Some suggestions from our expert: Alle Festplatten und Memorysticks, auf denen personenbezogene Daten sein könnten, verschlüsseln. Mit Windows 10 reichen die Standardfeatures von Windows, um eine ausreichende Sicherheit herzustellen…. […]
Expert tip for secure passwords:
Do not use a password twice. Do not change your password regularly, it will just make you forget your password and then pick the easy one that can be hacked quickly. Special characters do not automatically make a password more secure! The safest: the longer the password, the better. We would advise you to use… […]
Expert Tip: Encrypt your data carries
Do not use USB sticks that are not encrypted, unless the publication of data on the stick is not a problem for you. Mind that unencrypted personal data is a violation of the GDPR. You can encrypt disks using Windows 10 on-board tools. Alternatively, you can encrypt disks with open source tools like Veracrypt. How… […]
Expert Tip: Is my password safe?
Almost every week there is news of hacker attacks stealing passwords. Also known companies (LinkedIn, Dropbox, Adobe, …) were already among the “victims”. Many (but not all) of these stolen passwords then appear in the darknet and are used to access other services. You can check if your own e-mail address is affected by known… […]
WhatsApp on the company phone
The question of whether WhatsApp may be used on the company phone, is often asked. The answer is no. However, we would like to explain in more detail why the use according to DSGVO is not permitted. WhatsApp terms and conditions The basis of the use of WhatsApp are their terms and conditions. There it… […]
State of the art using the example of Panama Papers
In addition to information and news about the GDPR, we would also like to provide you with technical information so that you can better understand the subject of data protection. As required by the GDPR in article 32, all data processing must be carried out using state-of-the-art technology. Why this is so important is demonstrated… […]
Privacy Policy and Information Obligations
The Communication Act 2003 demanded even before the GDPR that website users have to be informed about the usage of personal data in a privacy policy. The GDPR demands in that data subjects have to be informed of the usage of their personal data when gathering it. demands that the data subjects have to be… […]