Data Protection

Datenschutz ist ein in der zweiten Hälfte des 20. Jahrhunderts entstandener Begriff, der nicht einheitlich definiert und interpretiert wird. Je nach Betrachtungsweise wird Datenschutz verstanden als Schutz vor missbräuchlicher Datenverarbeitung, Schutz des Rechts auf informationelle Selbstbestimmung, Schutz des Persönlichkeitsrechts bei der Datenverarbeitung oder Schutz der Privatsphäre. Datenschutz steht für die Idee, dass jeder Mensch grundsätzlich selbst entscheiden kann, wem wann welche seiner persönlichen Daten zugänglich sein sollen.
Artikel zum Thema Data Protection
  • EVIDENCE Final Conference took place

    … the Institute of Legal Information Theory and Techniques at the National Research Council (CNR-ITTIG) in Italy under the lead of Dr. Maria Angela Biasiotti coordinates the project and thus exchange of knowledge and experience with several project partners, among them the Leibniz Universität Hannover/IRI. On Thursday, 29th Biasiotti gave her welcome speech…

    Caroline Gentgen/ IRI Blog- 21 Leser -

  • The EU General Data Protection Regulation: Powerful Tool for Data Subjects?

    … Against All Odds – The Adoption of the General Data Protection Regulation Two months ago, the European Parliament and the Council have enacted the European General Data Protection Regulation (GDPR) as the result of a 4 years running legislative procedure. For a long time, it was uncertain whether the regulation could be passed at all: Not only…

    Verfassungsblog- 29 Leser -
  • Prep for the GDPR 101 – In-house crash course in one lesson

    … Finally, the EU General Data Protection Regulation (Regulation (EU) 2016/679, “GDPR”) is coming. Following a long lasting process of negotiations, two months ago the European legislator proposed the new privacy framework for Europe – and anyone doing business in Europe. So, how much time is left for your business to comply with the new rules…

    David Klein/ Kleinblog | David Klein- 49 Leser -
  • Data breach: What to do if it has happened?

    … of the keys for a successful handling of data breaches is to be consequent and have an aligned approach through your company against customers, contractors and the authorities. And consider that taking responsibility for the breach and communicating openly may be honored (and avoids at least partly bad press). This entry was posted in Privacy and tagged data breach, data protection, data security, litigation, privacy. Bookmark the permalink. …

    David Klein/ Kleinblog | David Klein- 33 Leser -
  • Data breach: How to prepare

    … measures etc. Have a look on your company insurance policy if it covers data breaches. As you may recognize, the above list is neither complete nor final. Depending on size of your company and your business model, you may prefer a slightly different focus. This entry was posted in Privacy and tagged data breach, data protection, data security, privacy. Bookmark the permalink. …

    David Klein/ Kleinblog | David Klein- 40 Leser -
  • The Essence of Privacy, and Varying Degrees of Intrusion

    … This brief comment will address the 6 October 2015 CJEU Grand Chamber ruling in Max Schrems, asking what it tells us about the status of two fundamental rights in the EU legal order, namely the right to the respect for private life (privacy) and the right to the protection of personal data (EU Charter of Fundamental Rights, Articles 7 and 8…

    Martin Scheinin/ Verfassungsblog- 62 Leser -
  • Schrems v. Commissioner: A Biblical Parable of Judicial Power

    … of the Philistine army. A less sensational reading of the decision might simply be that the European Commission did sloppy work when it issued Decision 2000/520, in which it concluded that the United States ensures an adequate level of protection for electronic communications data. The Commission’s Decision wasn’t thorough enough, it didn’t apply the correct…

    Verfassungsblog- 60 Leser -

  • Data protection: using leased copy machines

    … Modern copy machines use hard drives for the intermediary storage of copied documents. Copy machines (usually) do not automatically delete the data on these hard drives. That means: The scanned data from the documents copied by the machine can be found on the copy machine’s hard drive. Please read the following 3-point list of measures, which…

    Datenschutzbeauftragter Online- 26 Leser -
Täglich juristische Top-Meldunden
Cookies helfen bei der Bereitstellung unserer Dienste. Durch die Nutzung erklären Sie sich mit der Cookie-Setzung einverstanden. Mehr OK