Why Is Encryption Important? More and more companies get breached these days, undergoing huge financial and reputational losses. Over 5 billion records were compromised in 2019. The 2019 data breaches cost businesses over $2 trillion in total. The chance of a company becoming a data breach… Read More »Data Encryption: Importance, Best Practices, IT Compliance
In this blog category you will find information about data protection, data processing, and all the IT perspectives from protecting data online.
What Is Searchable Encryption? Encryption is the method by which information is converted into a secret code that hides the information’s true meaning. Encryption is widely used to protect different kinds of data stored and transferred online, in order to protect malicious actors from revealing… Read More »Why Is Searchable Encryption So Important?
Electronic signatures are legally meaningful ways to store interaction by end-users. That’s an oversimplified explanation and certainly not a definition, but in the context of web and mobile applications, it is that. The European Union defined electronic signatures in a regulation (eIDAS) in order to… Read More »Practical Electronic Signatures For Your Website
During the webinar Bozhidar Bozhanov will review the types of encryption, their benefits across different scenarios and the challenges in using encryption.
Due to the COVID-19 crisis, businesses and governments have developed contact tracing apps to help health authorities overcome the situation. Although the effectiveness of those applications is still unclear, they happen to process large amounts of personal data. Respectively some of them tend to operate… Read More »Centralized vs. Decentralized Approaches to Protecting User Data
Personal health information (PHI) is very sensitive and is therefore subject to many regulations around the world – most notably, GDPR in the EU and HIPAA in the US. We have covered both regulations in depth (GDPR articles, HIPAA articles), but the specifics of each… Read More »How to Store Personal Health Information Securely
It is no secret that the German healthcare sector is heavily regulated in all possible aspects. The new Digital Health Applications Ordinance (DiGAV) of 21st April 2020 allows only approved digital health apps (DiGA) to be reimbursed by the patient’s health insurance. We have previously… Read More »How to Easily Cover the New DiGAV Data Protection Requirements
The US presidential election is in a few months and although the coronavirus is currently occupying everyone’s attention, it will soon be shifting to the election. And among the chief concerns is election security and integrity. We have previously covered the importance of audit trail for election… Read More »Technical Guide to Protecting Voter Registration Databases
In light of the COVID-19 pandemic, governments and corporations leverage contact tracing mobile applications to help health authorities overcome the crisis. Those apps process vast amounts of sensitive personal data and sometimes operate in the gray area of data protection regulations. As we believe in privacy… Read More »Webinar: Privacy in Time of Pandemic
Privacy legislation around the world is different in its technicalities but has a lot in common. The most famous recent laws are GDPR (EU but with extra-territorial effect) and CCPA (California, but practically affects the US and even services outside the US). The Accountability Aspect… Read More »The Role of Accountability in Data Privacy As Seen in GDPR and CCPA