Blog

RSS

11 results

  • Foto de Glenn Carstens-Peters en Unsplash

    Personal Data Breach: Security Focused on Processing

    The GDPR obligates controllers to implement appropriate technical and organisational measures to ensure an appropriate security level to the risk of processing.

    Read more

  • deepmind-LaKwLAmcnBc-unsplash

    Neurodata: privacy and protection of personal data (II)

    Brain-computer interfaces make possible to record the activity generated by the brain. This activity depends on internal and external factors to the individual, which act on a certain genetic basis. These technologies allow the collection of neurodata which, as they are associated with identified or...

    Read more

  • machine-learning

    Neurodata and neurotechnology: privacy and protection of personal data

    Recent advances in neuro-technology and artificial intelligence are enabling the emergence of a growing number of connected devices that monitor brain activity for different purposes. 

    Read more

  • Blog: Reconocimiento facial

    Use of biometric data: Assessment from a data protection perspective

    Processing operations involving biometric data operations can be used for many different purposes, such as proof of life, identification, authentication, tracking, profiling, automatic decisions, etc. Biometric operations can use different techniques, some of them simultaneously, and the same...

    Read more

  • Blog - Brechas en entornos de PRE

    Personal Data Breaches: Development and Pre-Production Environments

    Frequently, major personal data breaches do not occur in the most important systems of an organisation, but in secondary systems or systems considered less important but which hold a large amount of information or may be the gateway to other systems. This is the case of test, pre-production or...

    Read more

  • Reuniones online

    Privacy in Online Meetings

    Virtual online meetings via voice calls, video or web services are a common feature of today's work and teleworking, which has been greatly increased due to the COVID-19 pandemic. Although we are increasingly aware of the need to protect our privacy and security online, virtual meetings require us...

    Read more

  • IoT II

    IoT (II): from the internet of things to the internet of bodies

    The advancement of hyperconnected technology is increasing these days. The Internet of Things or “IoT” is a reality that has reached our houses through all sorts of “intelligent” devices that we may find even in supermarkets but also in vehicles and on our bodies. In this last case, new risks for...

    Read more

  • blog acortadores url

    URL shorteners

    Widespread use of instant messaging tools, microblogging services and other social media with character limitation functions has led to a generalisation of shortened links (URLs) to share web addresses. However, when we click on a short URL we cannot be sure of where it will point to, and this may...

    Read more

  • Cifrado homomorfico

    Encryption and Privacy III: Homomorphic encryption

    In the framework of “Encryption and Privacy”, this article focuses on homomorphic encryption. This privacy by default technique is suitable for cases where a controller contracts a processor to carry out part of the processing and the controller wishes to ensure, from a technical point of view, that...

    Read more