


Viruses, Trojans, and security vulnerabilities. Procedure and significance for data protection.
Viruses and Trojans infect PCs again and again. Mostly unnoticed by the user, you receive an application as a Word document and are not surprised when you click on it and open the application. Already here it is usually too late. The embedded malicious program downloads...
Data protection, meaning and history
Data protection Data protection, meaning and history - origin of data protection Data protection has been around for many years. Since we collect, store and share data, we have had to deal with the issue. Technology is making more and more possible and...
Pets and privacy
Animals and data protection Yes, you read correctly. Animals and the topic of data protection. Personal data is processed during every visit to the vet. The new data protection law also applies here. In addition to treatment documentation, the veterinarian also needs information on the...
Data protection and new customers,Cold calling - watch out!
Data protection and new customers Since companies do not like to wait for customers, they like to consider the possibility of acquiring new customers. Customers need to be excited about their own product or brand. For telephone professionals, this is a piece of cake. Once...
Silence is golden... does silence count as consent?
Silence is golden... does silence count as consent? Silence is golden, isn't it? The other day there was the question of whether you also give your consent if you do nothing. So tacitly, by letting a set deadline pass and not acting....
Personal data please not in the garbage can
Disposing of documents Everyone knows that, the mailbox is almost overflowing. When sorting the mail, we always find letters that advertise a product, a service or various newsletters. Apart from whether we want to have these, ever our consent...
Data protection and security, what measures to take
Data protection and security At best, the start of the new week is stress-free and without further incidents. In the best case... But there are also days that do not start optimally. You drive onto the company premises in the morning, park your vehicle and go out like...
Pseudonymization or anonymization of the data
Pseudonymization or anonymization of data Protecting personal information is not easy. Thanks to the current technology, it is possible to quickly find out highly sensitive information of the data subjects. Therefore, thoughts and the implementation of anonymization...
Customer ratings and privacy, feedback and reviews
Customer reviews and data protection The opinions of our customers and business partners are enormously important for our company. Good criticism as well as negative reviews allow us to move forward. We are pleased about a positive feedback, because it confirms our...
Is GPS monitoring of employees allowed?
Is GPS monitoring of employees allowed? In this day and age, it is becoming easier and easier to locate people. It is easy to find out where the person is at any given time. Thanks to GPS in the company car or cell phone, it is a piece of cake...