Violations in the tenant self-disclosure

Violations in the tenant self-disclosure

Tenant self-disclosure During your search for the (dream) apartment, sensitive data is disclosed even before the rental agreement is signed. Once the coveted property has been found, the self-disclosure and further questions follow. Here, for example, you enter your first and...
Finally quiet on the phone?

Finally quiet on the phone?

Finally silence on the phone The phone rings. Nothing unusual. Actually, it should ring much earlier. Finally (!), you think, jump up, run and pick up the receiver. At the other end, there's a short silence and then, unfortunately, it's not the voices that greet you...
We are only a small club

We are only a small club

Data protection in the association, "What should happen, we are only a small association? The sentence is easily pronounced, but could ultimately cost the entire club head and neck. Not that in about a warning from the authority is pronounced or...
Use e-mails in a DSGVO-compliant manner

Use e-mails in a DSGVO-compliant manner

State-of-the-art technology Creating and processing e-mails in a data protection-compliant manner is now essential. Currently, e-mails and their content are transport-encrypted (TLS) from the e-mail sender (client) to an e-mail recipient (client) via an e-mail server (server)....
Data protection breach with e-mail use

Data protection breach with e-mail use

Data protection violation with e-mail use based on case examples 1st case CC instead of BCC If you send an e-mail to several recipients and the recipients can see each other (CC and not BCC), this would be the case with e-mails that cannot be found publicly with first and...
DSB buchen
en_USEnglish