


Personal web tracking only with consent
The Federal Commissioner for Data Protection today again points out that websites must obtain consent from their users before tracking begins. This currently happens on very few websites, because many website operators...
Antivirus software the supposed security
Often one hears from IT managers that the main defense against malware is antivirus software in their current IT security strategy. Furthermore, one hears and sees that IT security updates are heavily delayed or not installed at all, because that...
Challenges of the e-mail process / e-mail data protection
E-mail data protection Most e-mails are business letters and are therefore subject to retention periods under commercial law (6 years) which compete with the deletion periods (e.g. if the purpose no longer applies) of data protection. E-mails contain many different...
Common mistakes in the implementation of Art.32 - EU-DSGVO - Security of processing
Security of processing As a data protection controller, you have to comply with various data protection requirements with regard to data security. Often, you have to rely on service providers you trust. This trust...
Articles 13 and 14 GDPR using the example of a debt collection agency
Preface According to Recital 47 and Article 6 of the GDPR, a creditor has a legitimate interest and thus the right to engage a debt collection agency vis-à-vis defaulting debtors. Article 13 of the GDPR states that in the case of direct data collection, the data subject must be...
Viruses, Trojans, and security vulnerabilities. Procedure and significance for data protection.
Viruses and Trojans infect PCs again and again. Mostly unnoticed by the user, you receive an application as a Word document and are not surprised when you click on it and open the application. Already here it is usually too late. The embedded malicious program downloads...
Data protection, meaning and history
Data protection Data protection, meaning and history - origin of data protection Data protection has been around for many years. Since we collect, store and share data, we have had to deal with the issue. Technology is making more and more possible and...
Pets and privacy
Animals and data protection Yes, you read correctly. Animals and the topic of data protection. Personal data is processed during every visit to the vet. The new data protection law also applies here. In addition to treatment documentation, the veterinarian also needs information on the...
Data protection and new customers,Cold calling - watch out!
Data protection and new customers Since companies do not like to wait for customers, they like to consider the possibility of acquiring new customers. Customers need to be excited about their own product or brand. For telephone professionals, this is a piece of cake. Once...
Silence is golden... does silence count as consent?
Silence is golden... does silence count as consent? Silence is golden, isn't it? The other day there was the question of whether you also give your consent if you do nothing. So tacitly, by letting a set deadline pass and not acting....