Messages from the Berlin data protection authority at the level of the White House
Firstly, some of them should first learn the basics of data protection law before they open their mouths, and secondly, there are...
Firstly, some of them should first learn the basics of data protection law before they open their mouths, and secondly, there are...
A "common hacker" could just as easily have found the data records and downloaded them illegally. Just because this is due to...
Rude, unfriendly, incompetent and unacceptable. Bad service is written in capital letters at Microsoft. Microsoft's philosophy: Take it or leave it....
Since every lawyer, every law firm and every court is legally obliged to use the beA system, we have calculated...
Cracking a password-protected PDF or ZIP file usually only takes a few seconds with the right tools....
A lost customer costs less money than providing support in the event of an error.
Closing your eyes and going through the motions will not work here. It is therefore all the more important that each individual contributes as much...
How bitter it must be for a supposed market leader to have been incapable of developing its own functioning...
I assumed that the guy had long since landed in jail and was serving time for his offences. Two to...
Pageviews: 334 This article was first published at ITK SECURITY. IT Security Act? The law on IT security exists...