What you should consider as a patient

What you should consider as a patient

What you should pay attention to as a patient What you should pay attention to as a patient and how to behave properly, you will learn here. When you go to the doctor you trust, you will, in the best case, be greeted at the registration with a form which you sign...
Retention periods, you really need to know!

Retention periods, you really need to know!

Retention periods, you absolutely have to know! The retention periods for data protection are often based on laws such as the HGB and the AO. All business data must be retained for a specified period of time and in such a way that it is still...
External DPO, a decision you will not regret!

External DPO, a decision you will not regret!

External DPO, a decision you will not regret! For a short time, everyone who works in a company or is self-employed has been dealing with the big issue of data protection. The question: external or internal DPO? The appointment of a data protection officer...
Family life in public, danger for your children

Family life in public, danger for your children

Family life in public, danger for your children Does this sound familiar? You're sitting comfortably on the couch on a Sunday night, clicking through your phone, and countless status pictures flood your mind. Almost every status message shows us a different picture....
Vacation time, travel time and data protection

Vacation time, travel time and data protection

Data protection on the move Toward the sun, vacations at last, the well-deserved vacation and a carefree way to unwind. The dog is taken care of, the flowers too, and the mail is dropped off at the friendly lady next door. But what about your own data?...
Violations in the tenant self-disclosure

Violations in the tenant self-disclosure

Tenant self-disclosure During your search for the (dream) apartment, sensitive data is disclosed even before the rental agreement is signed. Once the coveted property has been found, the self-disclosure and further questions follow. Here, for example, you enter your first and...
Finally quiet on the phone?

Finally quiet on the phone?

Finally silence on the phone The phone rings. Nothing unusual. Actually, it should ring much earlier. Finally (!), you think, jump up, run and pick up the receiver. At the other end, there's a short silence and then, unfortunately, it's not the voices that greet you...
We are only a small club

We are only a small club

Data protection in the association, "What should happen, we are only a small association? The sentence is easily pronounced, but could ultimately cost the entire club head and neck. Not that in about a warning from the authority is pronounced or...
Use e-mails in a DSGVO-compliant manner

Use e-mails in a DSGVO-compliant manner

State-of-the-art technology Creating and processing e-mails in a data protection-compliant manner is now essential. Currently, e-mails and their content are transport-encrypted (TLS) from the e-mail sender (client) to an e-mail recipient (client) via an e-mail server (server)....
Data protection breach with e-mail use

Data protection breach with e-mail use

Data protection violation with e-mail use based on case examples 1st case CC instead of BCC If you send an e-mail to several recipients and the recipients can see each other (CC and not BCC), this would be the case with e-mails that cannot be found publicly with first and...
DSB buchen
en_USEnglish