Blog

RSS

64 results

  • IoT II

    IoT (II): from the internet of things to the internet of bodies

    The advancement of hyperconnected technology is increasing these days. The Internet of Things or “IoT” is a reality that has reached our houses through all sorts of “intelligent” devices that we may find even in supermarkets but also in vehicles and on our bodies. In this last case, new risks for...

    Read more

  • Reuniones online

    Privacy in Online Meetings

    Virtual online meetings via voice calls, video or web services are a common feature of today's work and teleworking, which has been greatly increased due to the COVID-19 pandemic. Although we are increasingly aware of the need to protect our privacy and security online, virtual meetings require us...

    Read more

  • HTTPS: Cifrado en la web

    HTTPS: Encryption on the Web

    In most cases where a web browser or app on a mobile phone is used to surf on the Internet, encrypted connections are used through an HTTPS communication protocol (HyperText Transfer Protocol Secure or HTTP on TLS). This technique was initially applied to ensure communications in payment methods and...

    Read more

  • IoT (III) Domótica. Internet de las Cosas: riesgos y recomendaciones

    IoT (III): IoT Home Automation

    Finding home elements that have converted into intelligent devices with an Internet connection is increasingly frequent. So much so that we often see this type of devices in catalogues of furniture shops and even of supermarkets quickly becoming part of our homes. Thus, it is necessary to pay...

    Read more

  • Teletrabajo

    Telecommuting and data protection in the digital sphere

    More than a year ago, the exceptional situation resulting from the COVID-19 pandemic laid on the table of all kinds of organisations the urgent need for an unscheduled change in traditional business models. One of the most important issues was the implementation of telecommuting policies. In a...

    Read more

  • people

    Anonymisation and pseudonymisation

    Anonymisation and pseudonymisation are two concepts which are sometimes confused. Anonymous information is a data set which does not relate to an identified or identifiable natural person (Recital 26 of the GDPR), whereas pseudonymised information is a set of data that can no longer be attributed to...

    Read more

  • Privacidad diferencial

    Anonymisation and pseudonymisation (II): Differential privacy

    The strategic value of personal data for companies and organisations is obvious. However, the risk that the massive processing of personal data poses to the rights and freedoms of individuals and to our model of society is equally undeniable. For this reason, it is necessary to adopt the necessary...

    Read more

  • Blog - Cifrado y Privacidad (V): la clave como dato personal

    Encryption and Privacy V: The key as personal data

    The public key of a natural person is a unique identifier and its use in online services is generally associated with other types of information that make it possible to identify and profile the person holding such a key. Under these conditions, the public key is personal data that uniquely...

    Read more

  • Sin privacidad no hay ciberseguridad

    Without privacy there is no cybersecurity

    The ultimate aim of cybersecurity is to protect organisations and individuals by means of protecting their systems and networks. To this end, it makes use of organizational, legal and technical measures. The human factor is the key element behind the chain of security guarantees and, at the same...

    Read more