When data is anonymized, the reference to the person is ideally completely removed. De-identification/pseudonymization, on the other hand, retains the personal reference. Read more!
Read more
Japan's Personal Information Protection Law (APPI) regulates the handling of Japanese citizens' personal information by individuals and organizations, including businesses, government agencies, and non-profit organizations.
Read more
The New Zealand Privacy Act applies to all New Zealand government departments and agencies, companies, associations, businesses or other organizations that process personal data. Just like the CCPA and GDPR laws, not only companies headquartered in the place of the law, i.e., New Zealand, are affected, but also foreign companies, regardless of their location, as soon as they process personal data of New Zealand citizens.
Read more
The Nigerian Data Protection Regulation, 2019 ('NDPR') issued by the National Information Technology Development Agency ('NITDA') is the main data protection regulation in Nigeria.
Read more
Atlassian's implementation of Zero-Trust can help protect your modern enterprise from today's security threats. Implementing the Zero-Trust strategy is a trusted safeguard to avoid heavy penalties for violations against policies such as GDPR, CCPA, or HIPAA.
Read more
Um den Datenschutz in Ihrem Unternehmen so einfach wie möglich zu machen, sollten Sie sich und Ihre Mitarbeitenden etwas mehr mit dem Thema vertraut machen und klären, welche Daten schützenswert sind oder welche man am besten gar nicht speichert, um sie vor Missbrauch zu schützen.
Read more
As soon as employees leave your company, you should become active. Because there are several reasons why it is problematic if names of former employees are still present in your system.
Read more
Data security in Cloud computing is critical to protect confidentiality, ensure data integrity, maintain availability and meet regulatory requirements. Appropriate contracts with Cloud providers such as a Transfer Impact Assessment (TIA) are appropriate ways to ensure data security in the Cloud.
Read more