Blog

RSS

64 results

  • Phishing Campaigns Regarding The Coronavirus

    The alert situation caused by the coronavirus at a global level is a dangerous breeding ground for phishing attacks, which are being carried out internationally through instant messaging services, e-mail and any social media. Cybercriminals always try to take advantage of situations of fear and...

    Read more

  • Virus

    Notification of personal data security breaches during the state of alarm

    The critical situation caused by the COVID-19 pandemic at a global level has forced us to change our habits radically, to adopt social distancing measures and to use teleworking tools in order to continue performing professional tasks. This has led to an increase in risks and threats that take...

    Read more

  • Seguridad

    Personal data security breaches: Top 5 technical measures to be taken into account

    In this post, five technical measures will be explained with regard to security that play a main role in the processing of personal data in order to meet the obligations of proactive responsibility established in the GDPR. Such measures will be useful both to avoid security breaches of personal data...

    Read more

  • Vehículos conectados

    Connected Cars

    On 20 December 2019, the EDPS (European Data Protection Supervisor) published a “tech dispatch” on connected cars and data protection: “Connected Cars”. For your interest, here is a brief summary of the document.

    Read more

  • Personal data and Emergencies

    Personal data and emergencies

    The data are necessary to address emergency situations, like local, national or global emergencies. There are rules to make them accessible with the necessary legal, organizational and technical safeguards.

    Read more

  • Data protection and security

    Data protection and security

    Security is a necessary but not sufficient element to safeguard rights and freedoms of people regarding personal data protection. In addition, if security measures are not aimed at protecting said rights but to achieving other objectives, they may actually pose a threat to freedom.

    Read more

  • Recomendaciones para prevención del acoso digital

    Recommendations to Prevent Digital Harassment

    The Agency offers a set of recommendations aimed at eradicating workplace harassment and gender-based harassment when these types of behaviours occur in the digital sphere through the use and processing of personal data.

    Read more

  • Personal data breaches: online productivity platforms

    Personal data breaches: online productivity platforms

    Business email has evolved to become the gateway to productivity and office automation technology platforms in the cloud, through which much of an organisation's information - including personal data - flows. The potential for accessing all this strategic and confidential information has, in recent...

    Read more

  • Cifrado homomorfico

    Encryption and Privacy III: Homomorphic encryption

    In the framework of “Encryption and Privacy”, this article focuses on homomorphic encryption. This privacy by default technique is suitable for cases where a controller contracts a processor to carry out part of the processing and the controller wishes to ensure, from a technical point of view, that...

    Read more