


What is the landlord allowed to know? - Data protection in the tenancy
The GDPR also applies to landlords. You can find out here which data the landlord may ask for at which stage of the tenancy and which rights the tenant has under data protection law. Principle: It depends! In any case, the following applies to the data collection of the...
Phishing with fake QR codes: Protect your own data
In Austin, Texas, police are issuing a public warning about scams involving fake QR codes (quick response codes). What scam was used here and how you can protect their own data, you can learn here. Fraud scam false QR codes In Austin, Texas it came...
Encryption in data protection
Huge amounts of data are affected by data theft and unwanted disclosures every year. Cyber criminals usually target all types of data. That's why data must be protected from unauthorized access according to your protection needs, e.g., through encryption,...
Directory of processing activities: What goes in it? - VVT Part 2
The GDPR requires business owners to maintain a register of processing activities (Article 30 GDPR). In this second part on the VVT, you will learn what the content of a VVT must look like. Read Part 1 of the VVT series on the obligation to keep a VVT here....
Directory of processing activities: Does it have to be? - VVT Part 1
The GDPR requires companies to maintain a register of processing activities (Article 30 GDPR). In this first part on the VVT, you will learn who must keep such a register and what the consequences are in the event of a breach. Read part 2 here...
Checklist: When the police call - Information to authorities
It is not uncommon for the police to contact companies in order to clarify facts. In doing so, the authorities request the transmission of video surveillance recordings, IP addresses, names of drivers of the company car or similar personal data. But when...
Sanctions for data protection breaches - What is the threat now?
The nightmare of every data protectionist: a data protection breach has occurred. Everyone immediately thinks of fines and legal proceedings, but what are the real legal dangers of a data protection breach and how can they be avoided? Sanctions by...
When do regulators become dangerous?
Everyone involved in data protection under the GDPR fears the threat of fines in the event of a breach. In contrast, the other sanctions provided for in the GDPR receive little attention. Here you will get an overview of possible sanctions and how they can help your...
ECJ: Passenger monitoring goes too far
According to a decision of the European Court of Justice (ECJ), the previous passenger surveillance of the Federal Criminal Police Office (BKA) goes too far. According to the ruling, storage without any reason, as took place from August 2018 to April 2022, is inadmissible. Learn here the...
Schrems against Google
The data protection organization "Noyb" of Austrian activist Max Schrems has filed a complaint with the French data protection authority CNIL against advertising emails from Google. The subject of the complaint is paid advertising emails that Google sends to users'...