


Red alert: Data privacy breach!
Dreaded by every company, but always topical: the data protection mishap. The great fear of a data protection breach often results from a lack of knowledge about how to deal with such a situation. Find out here what to do and how to...
Privacy glitch in spam folder
At first glance, the spam folder in the email client does not indicate a data protection breach. However, if e-mails that are supposed to be deleted are inadvertently marked as spam only, it can lead to a manual check by the e-mail provider and in the...
Threatening letter under data protection law - What to do?
Following the decision of the Munich Regional Court on compensation for pain and suffering due to non-material damage resulting from the use of Google Fonts on a website, an increasing number of threatening letters under data protection law can now be found. The authors send data protection...
Ban Tesla? - Data privacy and autonomous driving
Time and again, there is criticism of the amounts of data that, in particular, motor vehicles of the American brand Tesla record and store from their surroundings. Now an attempt has been made in Berlin and in Beidaihe (China) to ban Teslas in certain areas. What...
Chat control violates fundamental rights
European and German data protection experts criticize the so-called chat control. Above all, they say, it violates fundamental rights and represents an "unprovoked and comprehensive monitoring of private communication". Read more here about the critical voices that...
Even higher fines? - New EDSA fine model
Fines are incurred in the event of a breach of the GDPR. Due to the lack of uniform regulations, these have varied widely to date. With the new guideline 04/2022, the European Data Protection Committee (EDSA) presents a possible Europe-wide fine model. All...
Model contracts for commissioned processing regularly unlawful
Companies must conclude a contract for processing with many service providers in advance. According to the data protection supervisory authority from Berlin (BInBDI), the model contracts used for this are regularly illegal, as they do not comply with Art. 28 DSGVO....
E-mail accounts as a security gap - what to do?
Cyberattacks on corporate email accounts are on the rise nationwide. What are the causes and how can companies strengthen their security in this area? Find out everything you need to know here. Cyberattacks on email accounts In...
Transmission of telemetry data - Is Windows compliant with data protection?
Windows is currently running on 78% of all computers that have Internet access. Microsoft also offers many software solutions for companies. But what data is transmitted to the American software giant and to what extent? And is the system safe in view of...
Ransomware - To pay or not to pay?
Ransomware is malware that encrypts files on the victim's computer and releases them only after a ransom is paid. The organization of cybercriminals is becoming more and more professional. What consequences a ransomware attack can have and...