


Even higher fines? - New EDSA fine model
Fines are incurred in the event of a breach of the GDPR. Due to the lack of uniform regulations, these have varied widely to date. With the new guideline 04/2022, the European Data Protection Committee (EDSA) presents a possible Europe-wide fine model. All...
Model contracts for commissioned processing regularly unlawful
Companies must conclude a contract for processing with many service providers in advance. According to the data protection supervisory authority from Berlin (BInBDI), the model contracts used for this are regularly illegal, as they do not comply with Art. 28 DSGVO....
E-mail accounts as a security gap - what to do?
Cyberattacks on corporate email accounts are on the rise nationwide. What are the causes and how can companies strengthen their security in this area? Find out everything you need to know here. Cyberattacks on email accounts In...
Transmission of telemetry data - Is Windows compliant with data protection?
Windows is currently running on 78% of all computers that have Internet access. Microsoft also offers many software solutions for companies. But what data is transmitted to the American software giant and to what extent? And is the system safe in view of...
Ransomware - To pay or not to pay?
Ransomware is malware that encrypts files on the victim's computer and releases them only after a ransom is paid. The organization of cybercriminals is becoming more and more professional. What consequences a ransomware attack can have and...
DSGVO vs GoBD - All entrepreneurs criminal?
The GoBD (principles for the proper keeping and storage of books, records and documents in electronic form), like the DSGVO, contains storage obligations. Which ones do companies have to adhere to now so that they do not incur fines or...
This is why the encryption of data is so important for its protection
When dealing with sensitive and personal data, its encryption is always a major issue. To show how important the encryption of data is for its protection, it is not even necessary to think of dramatic hacker attacks or the like. The...
No chat control after all?
EU Home Affairs Commissioner Ylva Johansson's draft on chat control and other measures in the digital space has met with criticism from various sectors. Johansson, however, is not letting her guard down, saying that the approval of the...
Works council as data protection law controller?
Wherever personal data is processed in a company, the person responsible must comply with data protection regulations. Violations of data protection regulations can result in heavy fines. As a rule, the...
Confluence security vulnerability
A zero-day security vulnerability has become known in the commercial wiki software from the Australian company Atlassian. Active exploitation is said to have already occurred. Discovery of the vulnerability The current vulnerability had already been discovered by...