A NIS2-covered entity must implement appropriate and proportional technical, operational and organizational measures to ensure supply chain security. NIS2 establishes standards for assessing NIS2...
A personal data breach is a breach of security leading to accidental or unlawful destruction, loss, alteration, or unauthorised disclosure of, or access to,...
A NIS2-covered entity must implement appropriate and proportional technical, operational and organizational measures to ensure supply chain security. NIS2 establishes standards for assessing NIS2...
A personal data breach is a breach of security leading to accidental or unlawful destruction, loss, alteration, or unauthorised disclosure of, or access to,...
European Commission has, in the aftermath of the Schrems II ruling, approved a new set of Standard Contractual Clauses (SCCs) with safeguards to permit...
A personal data breach is a breach of security leading to accidental or unlawful destruction, loss, alteration, or unauthorised disclosure of, or access to,...
A personal data breach is a breach of security leading to accidental or unlawful destruction, loss, alteration, or unauthorised disclosure of, or access to,...
European Commission has, in the aftermath of the Schrems II ruling, approved a new set of Standard Contractual Clauses (SCCs) with safeguards to permit...
The Data Protection Authorities (“DPA”) in the EU Member States have the mission to work for the protection of human rights regarding the processing...
Anonymization of personal data is the process of encrypting or removing personally identifiable data from data sets so that the person can no longer...
This article sets out the data processing agreement basics of responsibilities between two parties that share personal data as a by-product of their collaboration,...
Individuals right to information is about how to collect and use their personal data. This right has led to several information-related obligations that companies...