Posts

Personalisierte Kontaktdaten der Mitarbeiter von Geschäftspartnern - Ein datenschutzrechtliches Problem? - Datenschutz - DSGVO - Personenbezogene Daten - Daten - BDSG - BDSG neu

Personalized contact details for employees of business partners – a problem under data protection law?

The more detailed data processing operations are considered in corporate practice, the more data protection problems seem to arise. How does it look e.g. with the use of personalized contact details that have been sent to my company by business partners and are assigned to the employees of the business partner?

Read more

Information security, IT security and data protection – terms simply explained

Information security, data protection and IT security are three terms that are often used in the same context in everyday life, but have different meanings. The corresponding measures usually go hand in hand, but data protection, data security and IT security have very different priorities. All three areas are of crucial importance within a company. You can find out what is important in detail and what the specific differences are in the blog article.

Read more

GDPR made easy – with the data protection SOFTWARE “DOCU-SAFE” | part 2 processors

In part 2 of the series “GDPR made easy – with the data protection software docu-safe”, the function in “Processor” in the software is explained in more detail.
Read more

Reaktion zum Schrems II Urteil US-amerikanisches Handelsministerium veröffentlicht White Paper - Datenschutz -

Response to Schrems II judgment US Department of Commerce publishes white paper

The judgment of the European Court of Justice, which determined the ineffectiveness of the Privacy Shield Agreement between the European Union and the USA (Schrems II), did not go unnoticed in the USA either. In response, the US Department of Commerce has now published a white paper on data protection risk analysis as part of data export to the USA.

Read more

GDPR made easy – with the GDPR SOFTWARE “DOCU-SAFE” | Part 1 processing activities

The DSGVO software “docu-safe” ensures structured data protection management and thus helps to make the permanent implementation of the DSGVO in your company as easy, secure and smart as possible. In part 1 of the video series “GDPR Made Easy” we explain everything you need to know about the basics of GDPR software and about […]

DSGVO für Vermieter - Datenschutz - BDSG neu - BDSG - Daten - Personenbezogene Daten

GDPR for landlords – Part I Data protection must also be observed in the rental relationship

Credit information, wage and salary statements, information on the number of children and pets. This list is only a small overview of the personal data that are usually processed in the context of a tenancy. To protect this data and the rights and freedoms of the tenants concerned, landlords must also observe the General Data Protection Regulation. In the current blog post “GDPR for landlords” we inform you about some of the basic requirements that the GDPR places on landlords. In Part II of the article, we then turn to specific case studies in which data protection in the rental relationship must be observed.

Read more

4 Schritte zur ganzheitlichen IT- und Informationssicherheit - IT-Sicherheit - Informationssicherheit - ISB - Informationssicherheitsbeauftragter - ISMS - Assesments - TISAX

4 steps to holistic IT and information security

Hardly a week goes by without headlines about successful cyber attacks on companies. Not only large corporations, but also more and more small and medium-sized companies are the targets of cyber attacks. Regardless of whether the human factor is used as the attack vector or whether attacks are carried out directly on IT systems, the economic damage is enormous in most cases. In order to prevent such attacks, it is clear that a large number of IT security measures must be implemented in the company. The subject of IT and information security is complex and often not manageable. For this reason, organizations often ask themselves how one can initially approach such a complex topic in practice. Find out more about the first and, above all, essential steps to improve your information and IT security in our blog article.

Read more

DSGVO einfach erklärt: TOMs - Technisch-organisatorische Maßnahmen - DSGVO - Datenschutz - Daten - Personenbezogene Daten

GDPR explained simply: TOMs – technical-organizational measures

In today’s digital age in particular, it is important that companies take sufficient technical and organizational measures to protect personal data in accordance with GDPR.

From a factual point of view, absolute protection must be rejected. Nevertheless, there are measures that almost certainly prevent personal data from reaching unauthorized persons unhindered. In this blog article, we answer how protection is to be guaranteed.

Read more

ISMS einfach erklärt - IT-Sicherheit - IT-Security - Informationssicherheit - ISB - Informationssicherheitsmanagementsoftware - ISMS - Riskikofaktoren - Risikoidentifizierung - Risikoabschöpfung - Assets

ISMS – simply explained Part 2: Risk management as an essential part of the ISMS

In our blog article “ISMS – simply explained, Part 1: The importance of an ISMS for your company,” we have already described what you have to look out for when introducing an ISMS. In this blog article we introduce you to risk management as an essential component for the successful introduction of an ISMS. The task of risk management is to determine the company risks and to disclose their possible effects on your company and to treat them accordingly.

Read more

Was macht ein ISB? - Informationssicherheitsbeauftragter - ISB - Informationssicherheit - Datenschutz - DSGVO

Tasks of the information security officer (ISO)

In order to successfully implement an information security management system (ISMS) in a company, every company needs an information security officer (ISB). In this article we show you the extensive tasks of the ISB.

Read more