audit , CEPD , dark patterns , data protection by default , EDPB , GDPR , Internet , manipulation , mobile , praxis , RGPD , RRSS , SM , social media , social networks , verification
Smart contracts are algorithms that run without human intervention on a blockchain. When the result of the same has a significant impact on natural persons, or elaborate profiles, the requirements established in article 22 of the RGPD must be taken…
The ultimate aim of cybersecurity is to protect organisations and individuals by means of protecting their systems and networks. To this end, it makes use of organizational, legal and technical measures. The human factor is the key element behind the chain of security…
The public key of a natural person is a unique identifier and its use in online services is generally associated with other types of information that make it possible to identify and profile the person holding such a key. Under these conditions, the public key is personal data that uniquely…
The strategic value of personal data for companies and organisations is obvious. However, the risk that the massive processing of personal data poses to the rights and freedoms of individuals and to our model of society is equally undeniable. For this reason, it is necessary to adopt the…
Anonymisation and pseudonymisation are two concepts which are sometimes confused. Anonymous information is a data set which does not relate to an identified or identifiable natural person (Recital 26 of the GDPR), whereas…
More than a year ago, the exceptional situation resulting from the COVID-19 pandemic laid on the table of all kinds of organisations the urgent need for an unscheduled change in traditional business models. One of the most important issues was the implementation of…