WeChat: Data protection apparently stops at "political boundaries
What is particularly striking is that the app naturally also has access to location and environment data and even to the mobile phone's camera.
What is particularly striking is that the app naturally also has access to location and environment data and even to the mobile phone's camera.
rstly, some of them should learn the basics of data protection law before they open their mouths, and secondly, there is still such a thing as common sense.
Just as well a "common hacker" could have found the data sets and downloaded them illegally. Just because this didn't happen due to a lucky coincidence doesn't mean that everything was all right.
Rude, unfriendly, incompetent and unacceptable. Poor service is written large at Microsoft. Microsoft's philosophy: Take it or leave it. There is no support.
Since every lawyer, every law firm and every court is legally obliged to use the beA system, we have calculated that this represents licence fraud amounting to around USD 5 million per year.
Cracking a password-protected PDF or ZIP file usually takes only a few seconds with the right tools. A fact that banks, doctors and many other public authorities are often not aware of.
A lost customer costs less money than providing support in the event of an error.
How bitter it must be for a supposed market leader to be incapable of developing a functioning collaboration software for more than twenty years.
I assumed that the guy had long since landed in jail and was serving time for his offences. Two to three life sentences, so to speak.
Page views: 358 This article was first published at ITK SECURITY. IT security law? The law on IT security does not exist Why many companies do not deal with the topic of data security is not as difficult to understand as it may seem at first glance. You have to laboriously rummage through various legal texts and instructions before you...