von Ramona Höfler
The DSGVO software “docu-safe” ensures structured data protection management and thus helps to make the permanent implementation of the DSGVO in your company as easy, secure and smart as possible. In part 1 of the video series “GDPR Made Easy” we explain everything you need to know about the basics of GDPR software and about […]
Read more … GDPR made easy – with the GDPR SOFTWARE “DOCU-SAFE” | Part 1 processing activities
von Tobias Damasko
The Swedish fashion brand H&M is said to pay a fine of 35.3 million euros for spying on employees. Hundreds of employees at the service center in Nuremberg are said to have been monitored. The Hamburg commissioner for data protection, Johannes Caspar, justified the decree on Thursday. Read the blog article to learn more about the GDPR fine against H&M.
von Nadja-Maria Becke
Credit information, wage and salary statements, information on the number of children and pets. This list is only a small overview of the personal data that are usually processed in the context of a tenancy. To protect this data and the rights and freedoms of the tenants concerned, landlords must also observe the General Data Protection Regulation. In the current blog post “GDPR for landlords” we inform you about some of the basic requirements that the GDPR places on landlords. In Part II of the article, we then turn to specific case studies in which data protection in the rental relationship must be observed.
von Das Team der aigner business solutions GmbH
Hardly a week goes by without headlines about successful cyber attacks on companies. Not only large corporations, but also more and more small and medium-sized companies are the targets of cyber attacks. Regardless of whether the human factor is used as the attack vector or whether attacks are carried out directly on IT systems, the economic damage is enormous in most cases. In order to prevent such attacks, it is clear that a large number of IT security measures must be implemented in the company. The subject of IT and information security is complex and often not manageable. For this reason, organizations often ask themselves how one can initially approach such a complex topic in practice. Find out more about the first and, above all, essential steps to improve your information and IT security in our blog article.
von Das Team der aigner business solutions GmbH
In today’s digital age in particular, it is important that companies take sufficient technical and organizational measures to protect personal data in accordance with GDPR.
From a factual point of view, absolute protection must be rejected. Nevertheless, there are measures that almost certainly prevent personal data from reaching unauthorized persons unhindered. In this blog article, we answer how protection is to be guaranteed.
According to Article 32 GDPR, technical, organizational measures are prescribed measures to ensure the security of the processing of personal data.
Read more … GDPR explained simply: TOMs – technical-organizational measures
von Nadine Kampen
In our blog article “ISMS – simply explained, Part 1: The importance of an ISMS for your company,” we have already described what you have to look out for when introducing an ISMS. In this blog article we introduce you to risk management as an essential component for the successful introduction of an ISMS. The task of risk management is to determine the company risks and to disclose their possible effects on your company and to treat them accordingly.
Read more … ISMS – simply explained Part 2: Risk management as an essential part of the ISMS
von Nadine Kampen
In order to successfully implement an information security management system (ISMS) in a company, every company needs an information security officer (ISB). In this article we show you the extensive tasks of the ISB.
von Jan Schwemler
You just have to know what to look for! In our video we address the most important questions.
Read more … Data protection and marketing – what do you have to consider?
von Das Team der aigner business solutions GmbH
On August 4th, 2020 the Association of the Automotive Industry published a new version of the Information Security Assessment for TISAX® certifications. The current version 5.0 of the VDA-ISA catalog brings with it a new structure and fundamental changes in the structure of the modules. Find out more about the changes and the validity of the new requirements in our blog article.
Read more … VDA-ISA for TISAX® certifications: Publication of the new version 5
von Carola Aigner
The first impression counts, and this is especially true for visitors to your company. You can score points here with a professional visitor process. In the following, you will find out how to comply with data protection requirements but still meet requirements from the various areas.