


The 5 most common corporate data breaches
A wide variety of companies regularly report data privacy violations to the data protection authorities. For the companies concerned, this usually means high financial and reputational consequences. That is why they attach great importance to precautionary measures. Besides...
Recording telephone calls - compliant with data protection?
Many companies regularly draw valuable information from communication with customers. It is not uncommon for this information to be obtained via telephone calls. In order to secure this information, it makes sense, for example, to record telephone calls. But is this...
Tesla as company car not compliant with data protection?
Vehicles from the manufacturer Tesla are becoming increasingly popular, especially in the e-mobility scene. So it's no wonder that the idea of using Tesla vehicles as company vehicles is quickly being considered. In data protection law, this primarily involves...
Log4j vulnerability - What to do?
It has recently become known that the software library called Log4j has a security vulnerability. This can be exploited very easily to take over entire IT systems or to tap data. Many cybercriminals are now exploiting this, while IT professionals...
Log4j/Log4Shell Demo / Hacker Attack Demonstration
*Foreword* The video is about web applications as one of the many examples of the Log4j vulnerability, but the vulnerability potentially affects any software that uses Log4j. In the Log4j lists (see links below) of products and vendors read...
What does an external data protection officer do?
The GDPR regulates in Art. 37 ff everything about the data protection officer, whose appointment is mandatory for many companies. The data protection officer can be an employee of the data protection controller...
Data privacy breaches in the millions - disposal of Corona rapid tests with genetic material of tested persons too unsafe
Countless people are currently being regularly tested for infection with the Corona virus Covid-19. The well-known Corona rapid tests are used for this purpose. A swab from the throat or nasal mucosa is taken for evaluation. If the...
IT security under the traffic light coalition
On November 24, the SPD, the Greens and the FDP ("traffic light coalition") presented their coalition agreement. IT security is to be given a higher priority again in it. Instead of tightening surveillance of citizens, as has been the case in recent years,...
Data protection and employee survey
Employee surveys provide valuable information about the working atmosphere, the flow of processes, and possible improvements. But even with employee surveys, data protection must be maintained by the employer. Here you can find out what needs to be...
Data protection in the hospital
Of course, a visit to the hospital is not always pleasant. In addition to treatment, it is not uncommon for patients to receive many hospital data protection documents to sign. But which data protection regulations apply in the hospital...