Blog
Filters
64 results
-
Phishing Campaigns Regarding The Coronavirus
The alert situation caused by the coronavirus at a global level is a dangerous breeding ground for phishing attacks, which are being carried out internationally through instant messaging services, e-mail and any social media. Cybercriminals always try to take advantage of situations of fear and...
Read more
-
Notification of personal data security breaches during the state of alarm
The critical situation caused by the COVID-19 pandemic at a global level has forced us to change our habits radically, to adopt social distancing measures and to use teleworking tools in order to continue performing professional tasks. This has led to an increase in risks and threats that take...
Read more
-
Personal data security breaches: Top 5 technical measures to be taken into account
In this post, five technical measures will be explained with regard to security that play a main role in the processing of personal data in order to meet the obligations of proactive responsibility established in the GDPR. Such measures will be useful both to avoid security breaches of personal data...
Read more
-
Connected Cars
On 20 December 2019, the EDPS (European Data Protection Supervisor) published a “tech dispatch” on connected cars and data protection: “Connected Cars”. For your interest, here is a brief summary of the document.
Read more
-
Personal data and emergencies
The data are necessary to address emergency situations, like local, national or global emergencies. There are rules to make them accessible with the necessary legal, organizational and technical safeguards.
Read more
-
Data protection and security
Security is a necessary but not sufficient element to safeguard rights and freedoms of people regarding personal data protection. In addition, if security measures are not aimed at protecting said rights but to achieving other objectives, they may actually pose a threat to freedom.
Read more
-
Recommendations to Prevent Digital Harassment
The Agency offers a set of recommendations aimed at eradicating workplace harassment and gender-based harassment when these types of behaviours occur in the digital sphere through the use and processing of personal data.
Read more
-
Personal data breaches: online productivity platforms
Business email has evolved to become the gateway to productivity and office automation technology platforms in the cloud, through which much of an organisation's information - including personal data - flows. The potential for accessing all this strategic and confidential information has, in recent...
Read more
-
Encryption and Privacy III: Homomorphic encryption
In the framework of “Encryption and Privacy”, this article focuses on homomorphic encryption. This privacy by default technique is suitable for cases where a controller contracts a processor to carry out part of the processing and the controller wishes to ensure, from a technical point of view, that...
Read more