Blog
News and articles
Consequences of modifications to British data protection law
Data protection law in the United Kingdom is undergoing a time of considerable turmoil. Despite the United Kingdom’s exit from the European Union, EU institutions reported in February of this year that the country’s data privacy standards are still fairly similar to those of other EU member states.
The rise of BeReal – could social media pose a privacy risk?
A BeRea appl, a new social media platform, has recently achieved significant popularity. The application notifies all users in a given vicinity to take a shot (using both the front and rear cameras) within two minutes.
3 Reasons To Choose DBMT
The risks of improperly managing a privacy breach are high, but unfortunately not uncommon. A data breach puts immense pressure on a company to complete a lengthy and at times ambiguous to-do list of GDPR requirements which often takes up too much of the precious 72h time window allowed for reporting.
Largest GDPR Data Breach Fines
When in 2020 the UK Information Commissioner’s Office (ICO), made headlines with the monumental fines it imposed on British Airways and hotel chain Marriott for data breaches under the GDPR, concern was raised about just how high these fines could get.
More than just malicious attacks – human errors as threats to privacy
First thing that comes to mind, when thinking about causes of data breaches, is a malicious attack by a hacker. Since privacy incidents might be considered a crime, it is natural to automatically associate them with a criminal.
Subjectiveness as another obstacle on the data breach management journey
Widely-processed personal data in the contemporary world requires new assessments of the rules to accurately protect rights and freedoms of the individuals. The General Data Protection Regulation 2016/679 (GDPR), implemented in May 2018, led to a greater harmonisation of privacy rules in European Union.
Late Reporting – additional grounds for a fine under the GDPR
The number 1 cause for data breach incidents in 2019 was phishing and social engineering campaigns. These attacks are delivered via email 97% of the time and are designed to convince their recipients to give away their security credentials.
Right to be forgotten in the view of freedom of expression
There are many hypotheses trying to figure out the source of right to be forgotten. Some scholars take the view that the right derives from the history of Europe where totalitarian regime took the lives of many people just because they had Jewish origins.
PRIVACY OPTIMIZATION: THE TALE OF A FEMALE RUN REGTECH START-UP
A LegalTech start-up run by a female founder gets early traction in Warsaw with Dentons Poland and Santander Bank Poland and looks to expand to London, the RegTech European capital for further development and growth.
My home is my castle? Data protection challenges in smart homes
For years fictional smart homes have been portrayed in books and movies. Nowadays, fiction becomes true. Everyone can move to an apartment where every device is tailored to them. Growing technology facilitates people’s life, however, it also poses many risks and raises a lot of legal challenges.
What Are the Major Causes of Data Breaches?
The number 1 cause for data breach incidents in 2019 was phishing and social engineering campaigns. These attacks are delivered via email 97% of the time and are designed to convince their recipients to give away their security credentials.
The 7 Biggest Data Breaches of All Time
The possible lack of reporting during a pandemic and the unprecedented exposure of privacy data in Q1 of 2020 both represent the challenges businesses face in regard to GDPR compliance. And it isn’t just large global corporations.
GDPR: Disadvantage or Opportunity?
GDPR provides a structure for overall better business practices and a way for companies to maintain the trust of consumers despite the growing number of data loss and breach incidents that circulate in the news.
Covid19 Adds to Dramatic Rise in Data Breach Incidents
This is a very real concern, as some of the most common remote working risk behaviors include weak passwords, logging in to unsecured wireless networks, and misplaced devices. Also, many employees who work from home share a computer with other household members, making corporate data especially susceptible to a breach.