von Nadja-Maria

Data protection in Austria does not work without the GDPR! The Austrian data protection supervisory authority clarifies the relationship between the data protection sanctions. In Austria, too, it is not mandatory that in the event of a data protection breach, a data protection warning must first be issued and a second breach may only be punished with a fine. Rather, a fine is possible even for the first breach.

Read more …

von Das Team der aigner business solutions GmbH

Online translation tools offer a convenient way of having technical terms automatically translated into or from another language in both professional and private everyday life. Depending on the provider, such tools can also be used to translate long texts or at least passages of text. In the meantime, online translation tools are constantly being further developed using artificial intelligence processes, so that the end user receives ever better results from their translation. Employees in the professional environment are also increasingly making use of the support of such tools. From a data protection point of view, however, such services involve risks. Find out in our blog article which tools you can use and to what extent to ensure data protection-compliant use.

Read more …

von Rainer Aigner

The corona pandemic has often forced companies, more or less overnight, to let employees work from home. In order to maintain operations and, above all, internal and external communication, video conferencing has become the new communication standard worldwide, at an almost unbelievable speed. But which video conferencing system is the best choice in terms of data protection compliance?

Read more …

von Das Team der aigner business solutions GmbH

Although there is still no general requirement for TISAX® certification, it is required by more and more automobile manufacturers. In order not to endanger the partnership, certification is then inevitable at the latest. Satisfying the complex requirements remains a challenge for many companies.

Read more …

von Das Team der aigner business solutions GmbH

Many automobile manufacturers often develop their products in cooperation with supplier companies. In 2017, the Association of the Automotive Industry (VDA) developed the TISAX ® test and exchange mechanism to ensure secure processing and a trustworthy exchange of information between these companies. With TISAX®, a certification for information security in the company is created for automotive suppliers, which is specifically aimed at the needs of the automotive industry. The implementation of a TISAX® project is a complex challenge. With TÜV-certified TISAX® consultants from aigner business solutions GmbH, however, we support you efficiently and effectively in order to obtain the desired certification as quickly as possible. Find out more in our blog article and our first video in the TISAX ® series – simply explained.

Read more …

The Higher Administrative Court of Münster ruled on February 5th, 2020 that Gmail is not a telecommunications service. Gmail can therefore be seen as classic order processing and is therefore subject to the special requirements of the GDPR. In the following blog article, we’ll tell you what you have to do to use Gmail in a GDPR-compliant manner.

Read more …

WhatsApp has so far been used by many companies in their business operations, but the question of whether WhatsApp can be used in companies in accordance with GDPR must be answered with a clear NO. Under certain circumstances, its use can lead to considerable fines. In this blog article and our video, we answer the reasons for this and how WhatsApp can still be used to a limited extent in companies.

Read more …

von Rainer Aigner

At its meeting on January 29, 2020 in Brussels, the European Data Protection Committee (EDPB) passed the guideline on the GDPR-compliant use of video surveillance by a large majority. The supervisory authorities of the EU member states are once again focusing on the principles of proportionality. Every video surveillance represents a clear encroachment on the personal rights of those affected, which is why the operator of the video surveillance system must always have a “legitimate interest”.

Read more …

von Nadja-Maria

Even after Brexit, data transfer to the United Kingdom will be possible without additional measures. You can find out more about this below.

Read more …

von Das Team der aigner business solutions GmbH

Ransomware – A form of digital blackmail

Ransomware attacks are arguably one of the most widespread attack methods that cyber criminals use to harm companies. The attack method of digital blackmail aims to encrypt as many company-internal files as possible automatically. They should thus be made unusable for the company. The internal information can only be accessed again if the organization pays a ransom to the criminals and in return receives a decryption code for their unusable files. Encrypted files lead to production downtimes, reputational damage and financial losses in companies.

A complete and up-to-date data backup provides a remedy for this from a technical point of view. With this, you can quickly restore all lost information. In order to be able to reverse the effects of such an attack in a reasonable time frame, a sufficient and above all tested backup and restore concept must be in place for the company.

Read more …