{"id":7415,"date":"2022-04-08T08:09:52","date_gmt":"2022-04-08T06:09:52","guid":{"rendered":"https:\/\/www.actonic.de\/fallstricke-beim-datenschutz\/"},"modified":"2023-03-23T08:45:32","modified_gmt":"2023-03-23T07:45:32","slug":"data-security-pitfalls","status":"publish","type":"post","link":"https:\/\/actonic.de\/en\/data-security-pitfalls\/","title":{"rendered":"The most common data security pitfalls \u2013 and how to avoid them"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<p data-renderer-start-pos=\"1038\">After all, in a <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/www.cloudwards.net\/data-privacy-statistics\/#Five\" href=\"https:\/\/www.cloudwards.net\/data-privacy-statistics\/#Five\" data-renderer-mark=\"true\">study by Aikami, <\/a>66% of all Internet users say they<strong data-renderer-mark=\"true\"> support <span id=\"90feb385-75aa-4170-9bae-a2a95ff92af1\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"90feb385-75aa-4170-9bae-a2a95ff92af1\">privacy policy regulations policies <\/span>like GDPR<\/strong> and would like to see more similar laws.<\/p>\n<p data-renderer-start-pos=\"1448\">So complying with all privacy policies saves both your wallet and your image. Unfortunately, data breaches often happen unintentionally when people are unaware of the most common data security pitfalls.<\/p>\n<p data-renderer-start-pos=\"1652\">That&#8217;s why we&#8217;re here to clear things up<span id=\"949361ac-a417-4354-a7f0-5d8d9c2a2aee\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"949361ac-a417-4354-a7f0-5d8d9c2a2aee\"> and<\/span> give you tips on how to avoid the most common pitfalls!<\/p>\n<h2 id=\"Not-updating-data-privacy-information\" data-renderer-start-pos=\"1754\">Not updating data privacy information<\/h2>\n<p data-renderer-start-pos=\"1793\">You know about the obligation to provide information under the GDPR and, of course, you have obtained all consents when collecting data for the first time. But have you also thought about the need to adapt the data protection information? <strong data-renderer-mark=\"true\">Data protection information changes<\/strong> more often than you might think. As soon as new IT systems are set up or new processing activities are carried out, the data security information must also be renewed. All data subjects must be informed of the update \u2013 even those who have already accepted previous notifications.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general-twolines&#8221;]<strong data-renderer-mark=\"true\">Solution<span id=\"ab675177-7bce-4350-bafe-95706d137f32\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"ab675177-7bce-4350-bafe-95706d137f32\">:<\/span><\/strong><span id=\"ab675177-7bce-4350-bafe-95706d137f32\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"ab675177-7bce-4350-bafe-95706d137f32\"> Find a wa<\/span>y to view current changes and communicate them transparently.[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Forgot-your-records-of-processing-activities\" data-renderer-start-pos=\"2433\">Forgot your records of processing activities<\/h2>\n<p data-renderer-start-pos=\"2479\">According to <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/gdpr-info.eu\/art-30-gdpr\/\" href=\"https:\/\/gdpr-info.eu\/art-30-gdpr\/\" data-renderer-mark=\"true\">Article 30 of the GDPR,<\/a> you must list all your processing activities, including which data is transferred to whom and for what purpose. The date of deletion must also be recorded. Your company has less than 250 employees? Then you don&#8217;t have to keep a processing register, right?<\/p>\n<p data-renderer-start-pos=\"2773\"><span id=\"09d86e74-34ec-4389-85e5-36d5bb0efc5b\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"09d86e74-34ec-4389-85e5-36d5bb0efc5b\">Wrong.<\/span><\/p>\n<p data-renderer-start-pos=\"2781\">Please put this myth out of your mind. A processing directory does not depend on the size of a company. It only doesn&#8217;t apply if no risks arise from data processing. However, risks always arise.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general-oneline&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>Please maintain records of processing activities carefully.[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Hoarding-dead-documents\" data-renderer-start-pos=\"3050\">Hoarding dead documents<\/h2>\n<p data-renderer-start-pos=\"3075\">&#8220;I just print out the processing directory, put it in the data protection documents folder and store everything in the basement. Duty fulfilled,&#8221; said no responsible data protection officer ever.<\/p>\n<p data-renderer-start-pos=\"3272\">Because it is important to keep all data up to date, also with this pitfall. Don&#8217;t rely on analog paperwork, whose transpare<span id=\"fd401244-68f3-4ff6-9ec0-55fbf33db4b3\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"fd401244-68f3-4ff6-9ec0-55fbf33db4b3\">ncy only a few pe<\/span>ople can comprehend.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>Digital tables, for example, can be kept up-to-date in <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/www.atlassian.com\/software\/confluence\" href=\"https:\/\/www.atlassian.com\/software\/confluence\" data-renderer-mark=\"true\">Confluence <\/a>with little effort. Get <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/marketplace.atlassian.com\/apps\/1217271\/inline-table-editing?tab=overview&amp;hosting=cloud\" href=\"https:\/\/marketplace.atlassian.com\/apps\/1217271\/inline-table-editing?tab=overview&amp;hosting=cloud\" data-renderer-mark=\"true\"><strong data-renderer-mark=\"true\">Inline Table Editing <\/strong><\/a>and you will experience Confluence tables in Excel style![\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Use-templates-from-providers\" data-renderer-start-pos=\"3618\">Use templates from providers<\/h2>\n<p data-renderer-start-pos=\"3648\">Unfortunately, many companies lack <span id=\"3351e7c9-78b2-4284-a854-e1dc23693bee\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"3351e7c9-78b2-4284-a854-e1dc23693bee\">the<\/span> time or motivation to deal sufficiently with data protection. To save resources, they rely on templates from various providers. However, these are often <strong data-renderer-mark=\"true\">not specifically customized for your company, <\/strong>and so it can quickly happen that you forget some important details. For example, you also need to document when recorded working times and application documents are deleted.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general-twolines&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>So rather leave the processing activities small-scale and work carefully![\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Not-objecting-is-far-from-consenting\" data-renderer-start-pos=\"4149\">Not objecting is far from consenting<\/h2>\n<p data-renderer-start-pos=\"4187\">Verbal consents to data processing are not effective. Without written consent that is fully and transparently documented, the basis for data processing according to<span id=\"cde08970-a7a3-405f-a8a6-23b845df7935\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"cde08970-a7a3-405f-a8a6-23b845df7935\"> <\/span>GDPR is missing. So be aware of when and for which topics you need consent and get the<strong data-renderer-mark=\"true\"> consent written. <\/strong>Watch out. Effectively given consents can be forfeited.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general-twolines&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>The best thing to do is to have a tool at hand to view the current statistics on<span id=\"45f42bb2-d6c5-4661-924a-6090b4b53247\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"45f42bb2-d6c5-4661-924a-6090b4b53247\"> consent.<\/span>[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Designate-an-alibi-Data-Protection-Officer\" data-renderer-start-pos=\"4616\">Designate an <span id=\"92ed38cb-2b54-41ce-9ed9-b593b9d59cd5\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"92ed38cb-2b54-41ce-9ed9-b593b9d59cd5\">alibi<\/span> Data Protection Officer<\/h2>\n<p data-renderer-start-pos=\"4660\">In some cases, you may need to designate a data protection officer. Due to time constraints, it is common to simply nominate a person so that the issue is off the table. But take this matter seriously! Data protection officers should be competent and reliable. In addition, there must be no <strong data-renderer-mark=\"true\">conflicts of interest.<\/strong> Consequently, it does no good if you also want to appoint your external IT service provider as external data protection officer. After all, you cannot monitor yourself.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general-twolines&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>Don&#8217;t try to trick the supervisory authority. Take the issue seriously.[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"See-data-security-as-your-enemy\" data-renderer-start-pos=\"5229\">See data security as your enemy<\/h2>\n<p data-renderer-start-pos=\"5262\">You are an agile company with thousands of brilliant ideas, and of course you want to implement them all. But it often happens that a company&#8217;s data protection officer puts supposed obstacles in your way. This and that cannot be implemented for data security reasons. You need consent for every photo. So cumbersome!<\/p>\n<p data-renderer-start-pos=\"5580\">In such situations, please remember the study quoted at the beginning: <strong data-renderer-mark=\"true\">Most people are grateful that the GDPR exists. <\/strong>You personally certainly don&#8217;t want your sensitive data to be freely accessible, either. Therefore, it is also important that you raise the awareness of the employees in your company for the topic of data security. As a team leader or even CEO, you should set an example and live a positive data protection culture. Your data protection officer is not a <span id=\"eb3bd658-0ec5-4b73-bd5a-3bd8c50f1568\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"eb3bd658-0ec5-4b73-bd5a-3bd8c50f1568\">buzz kill,<\/span> but wants to protect you from penalties and unflattering headlines.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>See the positive in the GDPR! If that doesn&#8217;t help, maybe a deterrent example? The prize for <strong data-renderer-mark=\"true\">the highest 2021 GDPR fine<\/strong> goes to Amazon. The company <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/www.enforcementtracker.com\/\" href=\"https:\/\/www.enforcementtracker.com\/\" data-renderer-mark=\"true\">had to pay no less than 746 million euros<\/a>.[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Outsourcing-what\u2019s-possible\" data-renderer-start-pos=\"6336\">Outsourcing what\u2019s possible<\/h2>\n<p data-renderer-start-pos=\"6365\">In principle, there is nothing to be said against outsourcing data privacy matters. In many cases, this is even more effective than an in-house solution. Nevertheless, as soon as activities are outsourced, an order processing contract must be drawn up with all details such as technical organizational measures. Sounds daunting, but our article about <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/www.actonic.de\/en\/order-processing-according-to-gdpr-article-28\/\" href=\"https:\/\/www.actonic.de\/en\/order-processing-according-to-gdpr-article-28\/\" data-renderer-mark=\"true\">order processing according to GDPR article 28 <\/a>will take away your fear.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general-twolines&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>Carefully create an <span id=\"b8c1aa46-923a-4a06-9397-18c9da8bb4f1\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"b8c1aa46-923a-4a06-9397-18c9da8bb4f1\">order processing contract <\/span>and a data processing agreement (DPA) \u2013 also with the help of apps.[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Wanting-to-keep-data-security-breaches-quiet\" data-renderer-start-pos=\"6916\">Wanting to keep data security breaches quiet<\/h2>\n<p data-renderer-start-pos=\"6962\">Mistakes can happen. And yes, it&#8217;s embarrassing to report them to the supervisory authority yourself. But you know what&#8217;s even more embarrassing (and costly)? When people affected by the data breach report the incident. So in the case of a data breach or unauthorized disclosure of personal information, be sure to:<\/p>\n<ol class=\"ak-ol\" data-indent-level=\"1\">\n<li>\n<p data-renderer-start-pos=\"7281\">Contact the affected individuals to mitigate the damage, and<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"7345\">Report the data breach to the authority as soon as possible.<\/p>\n<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>Act quickly. The GDPR defines a deadline of 72 hours. Learn more in our text about <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/www.actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/\" href=\"https:\/\/www.actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/\" data-renderer-mark=\"true\">how to deal with data leaks and breaches in a GDPR-compliant way.<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"Data-protection-evidence-trap\" data-renderer-start-pos=\"7571\">Data protection evidence trap<\/h2>\n<p data-renderer-start-pos=\"7602\">According to <a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/gdpr-info.eu\/art-5-gdpr\/\" href=\"https:\/\/gdpr-info.eu\/art-5-gdpr\/\" data-renderer-mark=\"true\">Article 5, paragraph 2 of the GDPR,<\/a> you are under accountability. So if you are accused of a data breach, they don&#8217;t have to prove that you committed a breach \u2013 you have to prove that you are acting in a data protection compliant manner! Another reason to have a transparent data protection program.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;info-box-general-twolines&#8221;]<strong data-renderer-mark=\"true\">Solution: <\/strong>An application that <span id=\"33ada504-5d34-4970-91b6-f4a48ef2aaea\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"33ada504-5d34-4970-91b6-f4a48ef2aaea\">lets<\/span> you quickly get real-time data on your data protection strategy on demand.[\/vc_column_text][vc_column_text]<\/p>\n<h2 id=\"One-solution-for-all-data-security-pitfalls\" data-renderer-start-pos=\"8029\">One solution for all data security pitfalls<\/h2>\n<p data-renderer-start-pos=\"8074\">To fully ensure data security in Jira and Confluence, there are several manual solutions and workarounds. Or you can get one app for everything, namely \u00a0<strong><a href=\"https:\/\/marketplace.atlassian.com\/search?query=GDPR%20%28DSGVO%29%20and%20Security&amp;_gl=1*13thhkz*_ga*MjAxMjA2ODMwOC4xNjUyMTY5MjE2*_ga_9LVM9V88PV*MTY3NTE0NzA3Ni44NTguMS4xNjc1MTQ4NTQ4LjU4LjAuMA..&amp;_ga=2.148962046.991877553.1675058683-2012068308.1652169216\">Data Protection and Security Toolkit for Jira\/Confluence.<\/a><\/strong><\/p>\n<p>Integrate the app into your software, and you have all the tools you need to overcome any hurdles. So, you get full data protection compliance with the GDPR with the least effort.<\/p>\n<p>Other data protection regulations such as <strong>CCPA, CPRA or HIPAA<\/strong> can also be easily dealt with our data protection app.[\/vc_column_text][vc_single_image image=&#8221;7410&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;link_image&#8221;][vc_column_text]<\/p>\n<h2 data-renderer-start-pos=\"8453\">Advantages of\u00a0Data Protection and Security Toolkit<\/h2>\n<ul class=\"ak-ul\" data-indent-level=\"1\">\n<li>\n<p data-renderer-start-pos=\"8496\">One single tool for all use cases<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"8533\">Obtain consents for data processing easily<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"8579\">View statistics of consents<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"8610\">Benefit from daily updated figures<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"8648\">Covers other data protection laws such as CCPA, HIPAA or LGPD as well<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"8721\">Benefits beyond data protection (for announcements, authorizations, etc.)<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"8798\">Save time and ensure data protection without risk<\/p>\n<\/li>\n<\/ul>\n<p data-renderer-start-pos=\"8853\">Using the GDPR app is the ideal basis to easily avoid the stumbling blocks. B<span id=\"e0b95c15-20e2-4d25-b1f6-d119aeb6b5a2\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"e0b95c15-20e2-4d25-b1f6-d119aeb6b5a2\">ut the installati<\/span>on alone is not sufficient to ensure compliance with the GDPR. Be sure to <strong data-renderer-mark=\"true\">do a requirements analysis <\/strong>of your specific situation so that the processes can be refined and adapted to your needs. We are happy to help you with the configuration,<a class=\"sc-eHgmQL jxCPuk\" title=\"https:\/\/www.actonic.de\/en\/contact\/\" href=\"https:\/\/www.actonic.de\/en\/contact\/\" data-renderer-mark=\"true\"> just contact us!<\/a><\/p>\n<p data-renderer-start-pos=\"9206\">You&#8217;ll see, with this app, data protection can be surprisingly simple.<\/p>\n<p data-renderer-start-pos=\"9278\">Convince yourself with our free trial version!<\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Data protection violations are subject to heavy penalties by the supervisory authority. It&#8217;s annoying when a violation of the GDPR happens unintentionally. Therefore, find out about the most common data security pitfalls in this article. We will show you how to avoid them!<\/p>\n","protected":false},"author":15,"featured_media":7414,"comment_status":"open","ping_status":"open","sticky":false,"template":"single_cta.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[238],"tags":[327,322],"class_list":["post-7415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-data-security","tag-data-security-en","tag-gdpr-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The most common data security pitfalls \u2013 and how to avoid them - Actonic \u2013 Unfolding your potential<\/title>\n<meta name=\"description\" content=\"Data security pitfalls \u279c Avoid the most common mistakes with these exclusive tips \u2705 Read now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/actonic.de\/en\/data-security-pitfalls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The most common data security pitfalls \u2013 and how to avoid them\" \/>\n<meta property=\"og:description\" content=\"Data security pitfalls \u279c Avoid the most common mistakes with these exclusive tips \u2705 Read now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/actonic.de\/en\/data-security-pitfalls\/\" \/>\n<meta property=\"og:site_name\" content=\"Actonic \u2013 Unfolding your potential\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-08T06:09:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T07:45:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/actonic.de\/wp-content\/uploads\/2022\/04\/Data-protection-pitfalls-EN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patricia Modispacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patricia Modispacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/\"},\"author\":{\"name\":\"Patricia Modispacher\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#\\\/schema\\\/person\\\/c700b8aadff4de9c01f096c78149a808\"},\"headline\":\"The most common data security pitfalls \u2013 and how to avoid them\",\"datePublished\":\"2022-04-08T06:09:52+00:00\",\"dateModified\":\"2023-03-23T07:45:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/\"},\"wordCount\":1519,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Data-protection-pitfalls-EN.jpg\",\"keywords\":[\"Data Security\",\"GDPR\"],\"articleSection\":[\"Data Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/\",\"url\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/\",\"name\":\"The most common data security pitfalls \u2013 and how to avoid them - Actonic \u2013 Unfolding your potential\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Data-protection-pitfalls-EN.jpg\",\"datePublished\":\"2022-04-08T06:09:52+00:00\",\"dateModified\":\"2023-03-23T07:45:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#\\\/schema\\\/person\\\/c700b8aadff4de9c01f096c78149a808\"},\"description\":\"Data security pitfalls \u279c Avoid the most common mistakes with these exclusive tips \u2705 Read now!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Data-protection-pitfalls-EN.jpg\",\"contentUrl\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Data-protection-pitfalls-EN.jpg\",\"width\":1200,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/data-security-pitfalls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/actonic.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The most common data security pitfalls \u2013 and how to avoid them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/actonic.de\\\/en\\\/\",\"name\":\"Actonic \u2013 Unfolding your potential\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/actonic.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#\\\/schema\\\/person\\\/c700b8aadff4de9c01f096c78149a808\",\"name\":\"Patricia Modispacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/83f51d32f34328d5faa7ff0292d03497d7df01baf810b0dc95a98f9818a08b7b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/83f51d32f34328d5faa7ff0292d03497d7df01baf810b0dc95a98f9818a08b7b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/83f51d32f34328d5faa7ff0292d03497d7df01baf810b0dc95a98f9818a08b7b?s=96&d=mm&r=g\",\"caption\":\"Patricia Modispacher\"},\"url\":\"https:\\\/\\\/actonic.de\\\/en\\\/author\\\/patricia-modispacher\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The most common data security pitfalls \u2013 and how to avoid them - Actonic \u2013 Unfolding your potential","description":"Data security pitfalls \u279c Avoid the most common mistakes with these exclusive tips \u2705 Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/actonic.de\/en\/data-security-pitfalls\/","og_locale":"en_US","og_type":"article","og_title":"The most common data security pitfalls \u2013 and how to avoid them","og_description":"Data security pitfalls \u279c Avoid the most common mistakes with these exclusive tips \u2705 Read now!","og_url":"https:\/\/actonic.de\/en\/data-security-pitfalls\/","og_site_name":"Actonic \u2013 Unfolding your potential","article_published_time":"2022-04-08T06:09:52+00:00","article_modified_time":"2023-03-23T07:45:32+00:00","og_image":[{"width":1200,"height":585,"url":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/04\/Data-protection-pitfalls-EN.jpg","type":"image\/jpeg"}],"author":"Patricia Modispacher","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patricia Modispacher","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/#article","isPartOf":{"@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/"},"author":{"name":"Patricia Modispacher","@id":"https:\/\/actonic.de\/en\/#\/schema\/person\/c700b8aadff4de9c01f096c78149a808"},"headline":"The most common data security pitfalls \u2013 and how to avoid them","datePublished":"2022-04-08T06:09:52+00:00","dateModified":"2023-03-23T07:45:32+00:00","mainEntityOfPage":{"@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/"},"wordCount":1519,"commentCount":0,"image":{"@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/#primaryimage"},"thumbnailUrl":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/04\/Data-protection-pitfalls-EN.jpg","keywords":["Data Security","GDPR"],"articleSection":["Data Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/actonic.de\/en\/data-security-pitfalls\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/","url":"https:\/\/actonic.de\/en\/data-security-pitfalls\/","name":"The most common data security pitfalls \u2013 and how to avoid them - Actonic \u2013 Unfolding your potential","isPartOf":{"@id":"https:\/\/actonic.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/#primaryimage"},"image":{"@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/#primaryimage"},"thumbnailUrl":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/04\/Data-protection-pitfalls-EN.jpg","datePublished":"2022-04-08T06:09:52+00:00","dateModified":"2023-03-23T07:45:32+00:00","author":{"@id":"https:\/\/actonic.de\/en\/#\/schema\/person\/c700b8aadff4de9c01f096c78149a808"},"description":"Data security pitfalls \u279c Avoid the most common mistakes with these exclusive tips \u2705 Read now!","breadcrumb":{"@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/actonic.de\/en\/data-security-pitfalls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/#primaryimage","url":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/04\/Data-protection-pitfalls-EN.jpg","contentUrl":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/04\/Data-protection-pitfalls-EN.jpg","width":1200,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/actonic.de\/en\/data-security-pitfalls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/actonic.de\/en\/"},{"@type":"ListItem","position":2,"name":"The most common data security pitfalls \u2013 and how to avoid them"}]},{"@type":"WebSite","@id":"https:\/\/actonic.de\/en\/#website","url":"https:\/\/actonic.de\/en\/","name":"Actonic \u2013 Unfolding your potential","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/actonic.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/actonic.de\/en\/#\/schema\/person\/c700b8aadff4de9c01f096c78149a808","name":"Patricia Modispacher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/83f51d32f34328d5faa7ff0292d03497d7df01baf810b0dc95a98f9818a08b7b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f51d32f34328d5faa7ff0292d03497d7df01baf810b0dc95a98f9818a08b7b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/83f51d32f34328d5faa7ff0292d03497d7df01baf810b0dc95a98f9818a08b7b?s=96&d=mm&r=g","caption":"Patricia Modispacher"},"url":"https:\/\/actonic.de\/en\/author\/patricia-modispacher\/"}]}},"jetpack_featured_media_url":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/04\/Data-protection-pitfalls-EN.jpg","_links":{"self":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/posts\/7415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/comments?post=7415"}],"version-history":[{"count":0,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/posts\/7415\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/media\/7414"}],"wp:attachment":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/media?parent=7415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/categories?post=7415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/tags?post=7415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}