Guides
Filters
36 results
-
GDPR Compliance of Processings that Embed Artificial Intelligence. An Introduction
In this document, we will focus in ensuring that any processing including weak AI components are compliant with the GDPR.
-
DNS Privacy
Despite the increase in Internet privacy awareness, the DNS protocol is probably the Great Ignored. This note identifies the privacy problems that the use of the DNS protocol may entail and the implications that the illegitimate processing of such data could have. In turn, it identifies the...
-
Introduction to the Hash function as a personal data pseudonymisation technique
This document analyses the sources of risk of reidentification in application of hash techniques, and establishes the need to carry out an objective analysis of this risk in order to determine whether this pseudonymisation or even anonymisation technique is appropriate
-
A Guide to Privacy by Design
The final goal is to ensure that data protection is present from the early stages of development and not a layer added to a product or system. Privacy should be an integrated part of the nature of said product or service.
-
The Duty to Inform and Other Accountability Measures for Mobile Devices
This technical note is addressed to those entities involved in the development, distribution and operation of apps for mobile devices, especially those which function as data controllers or joint controllers in each area of competence, as well as other any other agents involved in the mobile device...
-
Drones and Data Protection
In addition to the provisions established in air-space legislation, it must be borne in mind that the GDPR and LOPDGDD apply fully to the processing of personal data through the use of a drone, regardless whether the operation of the drone takes place in the professional or recreational sphere.
-
Access to Applications on the Screen for Android Devices
-