Blog
Filters
87 results
-
AI Voice Transcription (II): accountability, rights and transparency
Continuing with the analysis begun in the previous article on the data protection implications of AI voice transcription services, this second article explores in greater depth the allocation of responsibilities under the General Data Protection Regulation (GDPR) framework, errors arising in the...Leer más
-
Digital Identity as a Right (II): between data protection and the digital representation of the individual
Lorenzo Cotino, president of the Spanish Agency for Data Protection (AEPD)Leer más
-
Decoding Article 28 of the DSA: Age assurance and service design for online platforms
This article has been produced jointly by the Spanish National Markets and Competition Commission (CNMC) and the Spanish Data Protection Authority (AEPD)Leer más
-
Operational sovereignty in the processing of personal data
The impact suffered by one of the main cloud service providers on 20 October 2025, which affected global services from its region in the US. The US has highlighted a technical reality that often goes unnoticed in compliance analyses: critical operational dependence on the means of treatment. This...Leer más
-
The influencer hunter
NOVELThe influencer hunter DescriptionThe Influencer Hunter uses extreme violence to expose a truth about digital culture: in an ecosystem where visibility is the currency of exchange, intimacy becomes a commodity and personal data a product—or a weapon. Through a killer who targets famous...
Leer más
-
AI voice transcription: Implications for data protection
Artificial intelligence is an engine of innovation, enabling increased quality and productivity in the workplace and improving efficiency across various areas. Among these, we find voice transcription services, which have raised some questions among data controllers.Leer más
-
eIDAS2, the EUDI wallet and the GDPR (IV)
Several key data protection challenges are associated with the eIDAS 2 regulation, particularly regarding the implementation of EUDI wallets. These challenges arise from reconciling functionality, security and privacy. The following post analyses how different inaccuracy and non-repudiation threats...Leer más
-
Cyber Evolution: Corruption in the Technological City
NOVELCYBER EVOLUTION: CORRUPTION IN THE TECHNOLOGICAL CITY DescriptionIn Cyber Evolution: Corruption in the Technological City, Francisco Montero proposes a reflection on the risks that the digital age poses to privacy and individual freedom. Set in a hyperconnected metropolis, the novel shows how...
Leer más
-
eIDAS2, the EUDI wallet and the GDPR (III)
Several key data protection challenges are associated with the eIDAS 2 regulation, particularly regarding the implementation of EUDI wallets. These challenges arise from reconciling functionality, security and privacy. The following post analyses how different identifying threats could materialize...Leer más