Blog
Filters
64 results
-
Blockchain (III): Smart Contracts and personal data
Smart contracts are algorithms that run without human intervention on a blockchain. When the result of the same has a significant impact on natural persons, or elaborate profiles, the requirements established in article 22 of the RGPD must be taken into account from the design. This implies that...
Read more
-
Without privacy there is no cybersecurity
The ultimate aim of cybersecurity is to protect organisations and individuals by means of protecting their systems and networks. To this end, it makes use of organizational, legal and technical measures. The human factor is the key element behind the chain of security guarantees and, at the same...
Read more
-
Encryption and Privacy V: The key as personal data
The public key of a natural person is a unique identifier and its use in online services is generally associated with other types of information that make it possible to identify and profile the person holding such a key. Under these conditions, the public key is personal data that uniquely...
Read more
-
Anonymisation and pseudonymisation (II): Differential privacy
The strategic value of personal data for companies and organisations is obvious. However, the risk that the massive processing of personal data poses to the rights and freedoms of individuals and to our model of society is equally undeniable. For this reason, it is necessary to adopt the necessary...
Read more
-
Anonymisation and pseudonymisation
Anonymisation and pseudonymisation are two concepts which are sometimes confused. Anonymous information is a data set which does not relate to an identified or identifiable natural person (Recital 26 of the GDPR), whereas pseudonymised information is a set of data that can no longer be attributed to...
Read more
-
Telecommuting and data protection in the digital sphere
More than a year ago, the exceptional situation resulting from the COVID-19 pandemic laid on the table of all kinds of organisations the urgent need for an unscheduled change in traditional business models. One of the most important issues was the implementation of telecommuting policies. In a...
Read more
-
IoT (III): IoT Home Automation
Finding home elements that have converted into intelligent devices with an Internet connection is increasingly frequent. So much so that we often see this type of devices in catalogues of furniture shops and even of supermarkets quickly becoming part of our homes. Thus, it is necessary to pay...
Read more
-
HTTPS: Encryption on the Web
In most cases where a web browser or app on a mobile phone is used to surf on the Internet, encrypted connections are used through an HTTPS communication protocol (HyperText Transfer Protocol Secure or HTTP on TLS). This technique was initially applied to ensure communications in payment methods and...
Read more
-
Privacy in Online Meetings
Virtual online meetings via voice calls, video or web services are a common feature of today's work and teleworking, which has been greatly increased due to the COVID-19 pandemic. Although we are increasingly aware of the need to protect our privacy and security online, virtual meetings require us...
Read more