Blog

Filters

Sectorial

Results will be updated when selecting an option from the filters

Tags

Results will be updated when selecting an option from the filters

RSS

86 results

  • Digital Identity as a Right (II): between data protection and the digital representation of the individual

    Lorenzo Cotino, president of the Spanish Agency for Data Protection (AEPD)

    Leer más

  • Decoding Article 28 of the DSA: Age assurance and service design for online platforms

    This article has been produced jointly by the Spanish National Markets and Competition Commission (CNMC) and the Spanish Data Protection Authority (AEPD)

    Leer más

  • Operational sovereignty in the processing of personal data

    The impact suffered by one of the main cloud service providers on 20 October 2025, which affected global services from its region in the US. The US has highlighted a technical reality that often goes unnoticed in compliance analyses: critical operational dependence on the means of treatment. This...

    Leer más

  • El cazador de influencers - portada

    The influencer hunter

    NOVELThe influencer hunter DescriptionThe Influencer Hunter uses extreme violence to expose a truth about digital culture: in an ecosystem where visibility is the currency of exchange, intimacy becomes a commodity and personal data a product—or a weapon. Through a killer who targets famous...

    Leer más

  • AI voice transcription: Implications for data protection

    Artificial intelligence is an engine of innovation, enabling increased quality and productivity in the workplace and improving efficiency across various areas. Among these, we find voice transcription services, which have raised some questions among data controllers.

    Leer más

  • eIDAS2, the EUDI wallet and the GDPR (IV)

    Several key data protection challenges are associated with the eIDAS 2 regulation, particularly regarding the implementation of EUDI wallets. These challenges arise from reconciling functionality, security and privacy. The following post analyses how different inaccuracy and non-repudiation threats...

    Leer más

  • ciber-evolution

    Cyber Evolution: Corruption in the Technological City

    NOVELCYBER EVOLUTION: CORRUPTION IN THE TECHNOLOGICAL CITY DescriptionIn Cyber Evolution: Corruption in the Technological City, Francisco Montero proposes a reflection on the risks that the digital age poses to privacy and individual freedom. Set in a hyperconnected metropolis, the novel shows how...

    Leer más

  • blog-eidas-brett-jordan-unsplash

    eIDAS2, the EUDI wallet and the GDPR (III)

    Several key data protection challenges are associated with the eIDAS 2 regulation, particularly regarding the implementation of EUDI wallets. These challenges arise from reconciling functionality, security and privacy. The following post analyses how different identifying threats could materialize...

    Leer más

  • imagenblogkelly

    Keeping the balance between fundamental rights: the case of children protection

    When the issue of child protection on the Internet is discussed, the message that a balance must be struck between child protection and the right to the protection of all citizen’s data is almost always present, trying to find a balance. But this message is a fallacy, just like the one that states...

    Leer más