• Image
    01.16.2015

    Privacy Management 101

    Many ask the question, what makes a good privacy program? The answer is simple, really: Knowledge and action. Know what PII you have, take action to use it wisely and keep it secure.
    Rating: 0 (0)
  • Image
    12.19.2014

    A Smartphone Marketed with Privacy in Mind

    Blackphone aims to change the way we think about smartphones and privacy.
    Rating: 0 (0)
  • Image
    12.09.2014

    Blockbuster Sony Pictures Hack Leaks Sensitive Data

    Hackers reveal an epic failure of privacy and security
    Rating: 0 (0)
  • Image
    12.08.2014

    US: Privacygrade.org evaluates apps on data protection criteria

    For years, many companies considered data protection to be a costly tool, detrimental to innovation. The realization that holding such a view in the post-Snowden era can be harmful to business is becoming more and more prevalent. Thus Microsoft is taking legal action against the US government for the publication of data stored in Europe, Apple is emphasizing the Privacy by Design concept with its new Apple Pay service, and even WhatsApp is suddenly offering end-to-end encryption. Transparency seems to be the order of the day. This is also the aim of the website privacygrade.org, which evaluates apps based on their data protection options.
    Rating: 0 (0)
  • Image
    12.04.2014

    EU: European cyber-security

    On 30/10/2014, 29 European states represented by over 200 organizations came together for the largest ever cyber security exercise in Europe, organized by the European Network and Information Security Agency (ENISA). This measure, taken to defend against large-scale cyber-attacks targeting, for example, energy providers, financial institutes and other systemically important organizations, can also provide an opportunity for the responsible managers in other companies to consider their own cyber security and the associated risks.
    Rating: 0 (0)
  • Image
    12.04.2014

    Study suggests younger employees are at a higher risk while using mobile devices

    Particularly “young, dynamic” teams appear to have an increased risk while using mobile devices such as smartphones. In any case, this is the implication of a poll carried out by Oracle.
    Rating: 0 (0)
  • Image
    12.04.2014

    Bring Your Own Device (BYOD) – widespread and undetected!

    In a considerable number of companies, the benefits of BYOD are being used without the knowledge of company management or IT. According to a current study by Gartner, 40% of employees working for large US companies bring private devices into the company of their own accord and without being requested to do so in order to accomplish professional tasks.
    Rating: 0 (0)
  • Image
    12.03.2014

    DE: Unpermitted threat with data transfer to SCHUFA

    Defaulters are a problem experienced by many companies. It is thus useful to add corresponding force to the demand to balance the invoice when no payment has been recorded, even after the 2nd reminder. As the procedure is lengthy, even the threat of court action is not very successful for some defaulters. A note regarding notification to a credit agency, such as SCHUFA Holding AG, is much more effective. Those who lose their creditworthiness find it difficult to obtain financing or long-term contracts in their private and professional lives.
    Rating: 0 (0)
  • Image
    12.03.2014

    DE: Does the current guide from the supervisory bodies on cloud computing provide additional assistance?

    On 9 October 2014, the data protection officers of the German Federation and the federal states once again made their presence felt by publishing a guide on the topic of cloud computing. This is intended to make using cloud technology easier for decision-makers and data protection officers.
    Rating: 0 (0)
  • Image
    12.03.2014

    DE: Data Protection Authority Northrhine-Westfalia (LDI NRW) provides information on personal ID and data protection

    As a company, have you ever wondered how to perform an identity check that is in line with data protection law, and decided to request a copy of personal ID to prove someone’s identity or scanned in their personal ID? In most cases, it is not permitted to take a copy of personal ID or to scan it into an IT system. LDI NRW has now published assistance on how to handle personal ID in line with data protection.
    Rating: 0 (0)
first prev
1 2 3 4 5 6 7 8 9 10 ...
next last

© 2012 - 2019 |  2B Advice LLC - the privacy benchmark
7220 Avenida Encinas Ste 208 | Carlsbad | CA | 92011 | Phone: +1 (858) 366-9750 | Fax: +1 (212) 898 1248 | Email: sandiego@2b-advice.com
The pages do not contain any legal advice | No responsibility for the accuracy of the information. Please also notice: Privacy Notice | Legals

2B Advice GmbH Italy
|
2B Advice GmbH Germany | 2B Advice s.r.o. Slovakia United States of America | Slovakia | Germany | San Diego | Bonn | Berlin | Munich | Brezno | Verona