Blog

RSS

9 results

  • Blog Dark Patterns

    Dark patterns: Manipulation in Internet services

    Photo from JESHOOTS.COM The term dark patterns refers to user interfaces and user experience implementations intended to influence people's behaviour and decisions when interacting with websites, apps and social networks, so that they make decisions that are potentially detrimental to the protection...

    Read more

  • Blog - Brechas en entornos de PRE

    Personal Data Breaches: Development and Pre-Production Environments

    Frequently, major personal data breaches do not occur in the most important systems of an organisation, but in secondary systems or systems considered less important but which hold a large amount of information or may be the gateway to other systems. This is the case of test, pre-production or...

    Read more

  • Blog

    Blockchain (III): Smart Contracts and personal data

    Smart contracts are algorithms that run without human intervention on a blockchain. When the result of the same has a significant impact on natural persons, or elaborate profiles, the requirements established in article 22 of the RGPD must be taken into account  from the design. This implies that...

    Read more

  • blog acortadores url

    URL shorteners

    Widespread use of instant messaging tools, microblogging services and other social media with character limitation functions has led to a generalisation of shortened links (URLs) to share web addresses. However, when we click on a short URL we cannot be sure of where it will point to, and this may...

    Read more

  • Cifrado homomorfico

    Encryption and Privacy III: Homomorphic encryption

    In the framework of “Encryption and Privacy”, this article focuses on homomorphic encryption. This privacy by default technique is suitable for cases where a controller contracts a processor to carry out part of the processing and the controller wishes to ensure, from a technical point of view, that...

    Read more

  • Vehículos conectados

    Connected Cars

    On 20 December 2019, the EDPS (European Data Protection Supervisor) published a “tech dispatch” on connected cars and data protection: “Connected Cars”. For your interest, here is a brief summary of the document.

    Read more

  • Seguridad

    Personal data security breaches: Top 5 technical measures to be taken into account

    In this post, five technical measures will be explained with regard to security that play a main role in the processing of personal data in order to meet the obligations of proactive responsibility established in the GDPR. Such measures will be useful both to avoid security breaches of personal data...

    Read more

  • Virus

    Notification of personal data security breaches during the state of alarm

    The critical situation caused by the COVID-19 pandemic at a global level has forced us to change our habits radically, to adopt social distancing measures and to use teleworking tools in order to continue performing professional tasks. This has led to an increase in risks and threats that take...

    Read more

  • Phishing Campaigns Regarding The Coronavirus

    The alert situation caused by the coronavirus at a global level is a dangerous breeding ground for phishing attacks, which are being carried out internationally through instant messaging services, e-mail and any social media. Cybercriminals always try to take advantage of situations of fear and...

    Read more