Posts with the tag "data security"

Four Core Components of Higher IT Security

Four Core Components of Higher IT Security

Mitigating risks: For all businesses, IT security must be a crucial part of their overall strategy. In this article, I will outline its cornerstones and how tools can support the risk management process.

The use of information technology introduces risks – risks, however, that can be kept at bay by suitable measures. The following areas are crucial and worth being considered more in detail: software development, technical protection measures, staff training and risk management. Continue reading 

Safe Harbor 2.0: Relaunch of a Compromise

After Safe Harbor: A “Privacy Shield” shall protect the data of European citizens in the US.

In my last post I asked: “After Safe Harbor: Where is the legal certainty promised by the EC?“. Now the follow-up agreement for the regulation of transatlantic data transfers which has been expected for end of January at least is in sight. Yesterday the USA agreed at political level with the EC regarding a new framework with the promising name “EU-US Privacy Shield”. Continue reading 

After Safe Harbor: Where is the legal certainty promised by the EC?

The Safe Harbor vacuum: the legal certainty promised by the EC for end of January is still pending; thereby the future of transatlantic data transfers still remains unclear. Does the politics really leave the IT industry in the lurch?

In the European Community the handling of individual-related data is regulated by the Directive 95/46/EC, which is deemed as one of the safest data protection standards in the world. It prohibits the transfer of individual-related data from the EC to countries without a comparable level of protection. Continue reading