Download free GDPR compliance checklist!

Tag Archives for " publication "

DPO.guide

I am happy to announce, that my side project – DPO.guide – is live and open to public. The primary aim of project is to create and collect guidance and resources for data protection officers (DPOs) and everyone else interested in privacy and data protection.

DPO.guide is a living project – I will add more resources and functionality to website. And I hope you will both find the project useful and will help it grow – by adding resources and spreading the word.

There are still many functionality and parts to be added – like possibility to add resource by anyone directly from website. But we’ll get there with time. At the moment – please use contact form on the site. Or just email me links to resources that may be useful to others interested in privacy and data protection.

Latest bits on privacy and cybersecurity #3

This weeks collection of latest privacy, data protection and cyber-security news and interesting articles. Enjoy the reading!

Six month prison sentence to employee for data misuse

A motor industry employee has been sentenced to six months in prison in the first prosecution to be brought by the Information Commissioner?s Office (ICO) under legislation which carries a potential prison sentence.

Continue reading »

Privacy at the Margins

The International Journal of Communication has published new Special Section on ?Privacy at the Margins? with 10 articles from international scholars. Those articles look at a range of privacy experiences around the world.

Continue reading »

Paper on encryption workarounds and human rights

On 12 September, European Digital Rights (EDRi) – an association of civil and human rights organisations from across Europe – published the position paper ?Encryption Workarounds: a digital rights perspective?. Paper was published as a response?to the European Commission?s expert consultation exercise around the Encryption Workarounds paper by Orin Kerr and Bruce Schneier.

EDRi?s position paper describes ways law enforcement authorities can use?to access encrypted data within the framework of their investigations.

Download paper

Read also:

>