Data Protection

Datenschutz ist ein in der zweiten Hälfte des 20. Jahrhunderts entstandener Begriff, der nicht einheitlich definiert und interpretiert wird. Je nach Betrachtungsweise wird Datenschutz verstanden als Schutz vor missbräuchlicher Datenverarbeitung, Schutz des Rechts auf informationelle Selbstbestimmung, Schutz des Persönlichkeitsrechts bei der Datenverarbeitung oder Schutz der Privatsphäre. Datenschutz steht für die Idee, dass jeder Mensch grundsätzlich selbst entscheiden kann, wem wann welche seiner persönlichen Daten zugänglich sein sollen.
Artikel zum Thema Data Protection
  • EVIDENCE Final Conference took place

    … Evidence in Europe”, followed by a presentation about “Building Bridges between Different Actors” by Sabine Berghs, a Legal Officer at Interpol, which set the scene for session II chaired by Caroline Goemans-Dorny. Christian M. Hawellek, research associate at the Institute for Legal Informatics, highlighted the privacy, data protection…

    Caroline Gentgen/ IRI Blog- 21 Leser -


  • The EU General Data Protection Regulation: Powerful Tool for Data Subjects?

    … Against All Odds – The Adoption of the General Data Protection Regulation Two months ago, the European Parliament and the Council have enacted the European General Data Protection Regulation (GDPR) as the result of a 4 years running legislative procedure. For a long time, it was uncertain whether the regulation could be passed at all: Not only…

    Verfassungsblog- 29 Leser -
  • Prep for the GDPR 101 – In-house crash course in one lesson

    … Finally, the EU General Data Protection Regulation (Regulation (EU) 2016/679, “GDPR”) is coming. Following a long lasting process of negotiations, two months ago the European legislator proposed the new privacy framework for Europe – and anyone doing business in Europe. So, how much time is left for your business to comply with the new rules…

    David Klein/ Kleinblog | David Klein- 49 Leser -
  • Data breach: What to do if it has happened?

    … of the keys for a successful handling of data breaches is to be consequent and have an aligned approach through your company against customers, contractors and the authorities. And consider that taking responsibility for the breach and communicating openly may be honored (and avoids at least partly bad press). This entry was posted in Privacy and tagged data breach, data protection, data security, litigation, privacy. Bookmark the permalink. …

    David Klein/ Kleinblog | David Klein- 33 Leser -
  • Data breach: How to prepare

    … Data breach: How to prepare While personal information and likely sensitive data have become a common asset of nearly any business, data security is not that hot topic on the IT roadmap. Even global players in e-commerce have failed in the past to secure their data against 3rd party access. Several jurisdictions have specific regulations…

    David Klein/ Kleinblog | David Klein- 40 Leser -
  • The Essence of Privacy, and Varying Degrees of Intrusion

    … This brief comment will address the 6 October 2015 CJEU Grand Chamber ruling in Max Schrems, asking what it tells us about the status of two fundamental rights in the EU legal order, namely the right to the respect for private life (privacy) and the right to the protection of personal data (EU Charter of Fundamental Rights, Articles 7 and 8…

    Martin Scheinin/ Verfassungsblog- 61 Leser -
  • Schrems v. Commissioner: A Biblical Parable of Judicial Power

    … David v. Goliath Even before his big win at the Court of Justice of the European Union (CJEU) on Tuesday, Maximillian Schrems’ seemingly quixotic campaign against the giants of America’s shadowy security-complex and Internet service sector had attracted colorful allusions to the biblical tale of David and Goliath. It’s a good story, except…

    Verfassungsblog- 60 Leser -


  • Data protection: using leased copy machines

    … Modern copy machines use hard drives for the intermediary storage of copied documents. Copy machines (usually) do not automatically delete the data on these hard drives. That means: The scanned data from the documents copied by the machine can be found on the copy machine’s hard drive. Please read the following 3-point list of measures, which…

    Datenschutzbeauftragter Online- 26 Leser -
Täglich juristische Top-Meldunden
Cookies helfen bei der Bereitstellung unserer Dienste. Durch die Nutzung erklären Sie sich mit der Cookie-Setzung einverstanden. Mehr OK