

Data breakdown at the Corona test center
Data breach at Corona testing center Getting tested for infection with the Covid 19 virus is becoming almost commonplace for more and more people. Test centers have been set up in many places where this can be done quickly and usually even free of charge. Mostly...
Are WhatsApp's new terms of use compliant with data protection?
Current: Are WhatsApp's new terms of use compliant with data protection? WhatsApp plans to revise its rules on May 15, 2021. In it, the powers for data processing will be renewed and expanded. What WhatsApp represents as a small formality is in...
Fax is not compliant with data protection
Fax is not compliant with data protection Many companies and institutions still use fax to transmit information. This almost always involves personal data: invoices, delivery bills, pay slips, contract documents,...
Data protection in insolvency
Data protection in insolvency Particularly at a time when the economy is being affected by laws and regulations aimed at curbing the spread of the Covid 19 virus, many companies are faced with the issue of insolvency. Even if it's because of the delayed...
Secure WordPress blogs
Wordfence is a useful security measure for WordPress sites. Wordfence is a web application firewall (WAF) that detects and blocks malicious behavior. Among other things, login attempts are blocked and changes in the WordPress...
current DSGVO incidents from the economy
Every month, the data protection supervisory authority imposes fines for violations of the General Data Protection Regulation (GDPR). Enclosed you will find 2 recent examples. 1 - Late notification of a serious data breach Authority: Autoriteit Persoonsgegevens...
Data protection and Corona test for employees in Saxony
The employer is obliged to provide all employees who work on site with a free self-test at least once a week, as long as enough tests are available (§3a para. 1 SächsCoronaSchVO). The pure record who when...
Personal web tracking only with consent
The Federal Commissioner for Data Protection today again points out that websites must obtain consent from their users before tracking begins. This currently happens on very few websites, because many website operators...
Antivirus software the supposed security
Often one hears from IT managers that the main defense against malware is antivirus software in their current IT security strategy. Furthermore, one hears and sees that IT security updates are heavily delayed or not installed at all, because that...
Challenges of the e-mail process / e-mail data protection
E-mail data protection Most e-mails are business letters and are therefore subject to retention periods under commercial law (6 years) which compete with the deletion periods (e.g. if the purpose no longer applies) of data protection. E-mails contain many different...