COMPLIANCEdigital
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • AGB
  • |
  • Hilfe
Hilfe zur Suche
Ihr Warenkorb ist leer
Login | Registrieren
Sie sind Gast
  • Home
    • Nachrichten
    • Top Themen
    • Rechtsprechung
    • Neu auf
  • Inhalt
    • eJournals
    • eBooks
    • Rechtsprechung
    • Arbeitshilfen
  • Service
    • Infodienst
    • Kontakt
    • Stellenmarkt
    • Veranstaltungen
    • Literaturhinweise
    • Links
  • Bestellen
  • Über
    • Kurzporträt
    • Mediadaten
    • Benutzerhinweise

Suche verfeinern

Nutzen Sie die Filter, um Ihre Suchanfrage weiter zu verfeinern.

Ihre Auswahl

  • nach "eJournal-Artikel"
    (Auswahl entfernen)
  • nach "2020"
    (Auswahl entfernen)

… nach Zeitschriftenname

  • PinG Privacy in Germany (22)
  • Zeitschrift Interne Revision (16)
  • Risk, Fraud & Compliance (13)
  • Zeitschrift für Corporate Governance (8)
  • Zeitschrift für Compliance (ZfC) (2)
Alle Filter entfernen

Am häufigsten gesucht

Arbeitskreis deutsches Berichterstattung Deutschland Praxis PS 980 interne Fraud deutschen Analyse Revision Controlling Bedeutung Rahmen Banken
Instagram LinkedIn X Xing YouTube

COMPLIANCEdigital

ist ein Angebot des

Erich Schmidt Verlag GmbH & Co. KG

Suchergebnisse

61 Treffer, Seite 1 von 7, sortieren nach: Relevanz Datum
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 6/2020

    Data protection in times of Covid-19

    Comparative perspectives from Europe and beyond
    Yseult Marique, Olivia Tambou
    …: is the ­Covid-19 pandemic conducive to developing shared legal strategies or does it reinforce cultural legal features when it comes to data… …flesh it out legally. 1 Our scientific progress and its public funding are legitimized by enhancing it. The Covid-19 pandemic puts this model to the test… …developing shared legal strategies or does it reinforce cultural legal features when it comes to data protection? By the end of July 2020 Blogdroiteuropeen had… …factual and legal backgrounds. Secondly, constitutional techniques proved resilient to a large extent in general and in particular when it comes to data… …trend: the ever more articulated pressure on the European Union to decide how far it needs, wishes and is able to define its identity alongside its… …needed to run them. As legal systems may have to cope with the long-term consequences of Covid-19 all over the world, it may be useful to take stock of… …consequences are slowly starting to be better understood. In the early days of the pandemic it rapidly became apparent that elderly people were more vulnerable… …it or in terms of the symptoms developed. This explains the attention focused on obe- 4 Chris Ansell, Arjen Boin and Paul ‘t Hart, ‘Political… …data subjects. Secondly, even when data protection legislation is concerned with state/executive interference, it is a technical sub-set of wider… …resilience of data protection in these times of health emergency can be approached at the level of principles and in the concrete challenges it has met. 1…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "Zeitschrift Interne Revision" Ausgabe 2/2020

    Die Erhebungsmethode des Control Self Assessment (CSA)

    Ein ergänzendes Werkzeug der IT-Revision
    Dieter Paschke
    …Social Media geprägt. Die Informationstechnologie (IT) wird in den kommenden Jahren deutlich an Bedeutung gewinnen, und die Integration der… …aktuelle und zukünftige Veränderungen gut aufgestellt zu sein. Eine Konsequenz der digitalen Transformation aus Sicht der IT- Revision ist die steigende… …Verwendung einer gemeinsamen Sprache die Kommunikation zwischen den geprüften und den prüfenden Bereichen verbessert werden und der Beratungsgedanke der IT… …Self Assessment, S. 10. 02.20 ZIR 77 BEST PRACTICE Control Self Assessment Self-assessment IT Division / Unit / etc. Audit No.: XXXXXX Page 8 /16 Nr… …. Audit Area yes / no Response / Comment Audit comment 3 IT Operations 3.1 Do you use a ticket system to document and process service requests, incidents… …projektbegleitenden Qualitätssicherungen; Unterstützung bei Fragestellungen zu IT-Risiko-management, IT- Qualitätsmanagement, IT-Sicherheits-services und… …Prüfungs- und Beratungsansatzes an. IT REVIEW GmbH Wirtschaftsprüfungsgesellschaft Peter-Klöckner-Straße 5 D-56073 Koblenz Tel.: 49 261 30 457 63-0 Fax +49… …Digitalisierung und die damit steigende Komplexität der eingesetzten IT- Architekturen eine neue Herangehensweise an die Methodik und Prüfungsplanung erfordert. Die… …sich die IT-Landschaft einer Firma fortlaufend verändert (Einführung, Veränderungen, Außerbetriebnahme). Folglich ändert sich auch das Risiko der IT und… …IT- Revision wesentlich erweitert wird. 7. Fazit CSA ist eine ergänzende Methodik, welche Schwachstellen im Internen Kontrollsystem aufdecken kann. Mit…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2020

    In Search of Flexibility

    Risk, circumstances and context in interpreting the GDPR
    Dr. Jeroen de Jong
    …for businesses. It is often claimed that the adverse effects of absoluteness and non-scalabiity are mitigated to a large extent by the risk-based… …Chapter IV of the GDPR, but can be ­interpreted in line with the other fundamental notions of the GDPR, in order to offer more flexibility. More so if it is… …combined with the context principle. The context principle, which underlies the GDPR like the risk based approach is just as fundamental, since it draws in… …of the data subject proper (Art. 17, Para 2, 19, 21 4 and 22, Para 3). The requirements for controllers of Chapter IV are, it is usually assumed 5 , of… …way to their rights. Consequently, the state will have to invest in IT-systems and an organisation which abides by the data protection rules. It must do… …so, as it is bound by the rule of law to protect its citizens’ data. A sensible investment, well worth tax payers’ money. To a lesser extent the same… …transposition of the DPD between Member States could be a thing of the past. In Search of Flexibility de Jong PinG 05.20 175 Nevertheless, it is obvious that new… …. However important those provision may have been, it cannot be asserted the DPD is based on the ­risk-based approach as a fundamental instrument. Art. 17, 20… …the DPD and the GDPR is expressed in Rec. 89. It says: “the indiscriminate general notification obligations should […] be abolished, and replaced by… …“appropriate technical and organisational measures” to ensure the processing of personal data is in accordance with the regulation. However, it acknowledges the…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2020

    Interoperability of contact tracing apps in EU and data protection law implications

    Olga Gkotsopoulou
    …digital health networking platforms. Secondly, it explains how the use of the term ‘contact tracing’ is perceived in the contact tracing application context… …­COVID-19 and data protection. 12 The EDPB had earlier addressed a Letter to the Commission concerning the latter‘s draft Guidance, 13 in which it… …acknowledges that there is no size-fit-all solution for the current situation and it further requested clarifi­cations about matters included in the Guidance… …devices to apply, it should have been intended by the app manufacturer for it to be used for diagnosis, prevention, monitoring, prediction, prognosis… …, treatment or alleviation of disease. If an application is considered medical device, it will have to further comply with additional specific safety standards… …proximity ­detection or proximity tracking apps, 26 digital proximity apps and so forth. Before proceeding with the question of interoperability, it is… …the studied documentation is understood smartphones. However, it appears likely that those applications can be installed in other users’ devices… …can be as well presumed by the use of the term ‘device’ in the majority of the published documents. It is also noteworthy that EU Member States… …Member States report back to it the actions taken pursuant to that recommendation by the end of May and continue reporting for as long as the COVID-19… …contact tracing/warning apps will play a role in the lifting of containment measures. Nevertheless, in the documents of the Package, it is further…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 3/2020

    The Dark Side of the MOOC?

    The Rise of EdTech in Times of COVID-19: A Data Protection Challenge for Universities
    Jonas Botta
    …. Especially for universities, it makes sense to benefit from the numerous offers of e-learning platforms, mainly so-called Massive Open Online Courses (MOOCs)… …working ­paper series. It is based on the findings from the author’s doctoral thesis. See ­Jonas Botta, Datenschutz bei E-Learning-Plattformen: Rechtliche… …wishes. 12 In addition to user profiles, the public discussion forums of the online courses are another data source. In these forums, not only is it usual… …participants in real time, it is conceivable, for example, to implement face recognition software that would allow the attention and emotional state of users to… …collections resulting from MOOC use, online courses are proving to be an education-specific manifestation of the Big Data age. It is often solely up to the… …it as such”, 19 the educational reformer Wilhelm von Humboldt put it over 200 years ago. This never-ending search for new knowledge results in a… …comprehensive demand for information of universities and scientists, which can potentially collide with the privacy of the individual if it or at least its… …essence, it all depends on whether the data processing in question is for scientific research purposes. 20 aa) Data Processing for Research Purposes The… …privately funded research (Recital 159 sentence 2 of the GDPR). Although the EU legislator did not define the concept of research itself in more detail, it… …processes user data from the MOOCs it supervises, for instance within the framework of an educational science study on what indicates a dropout in digital…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 1/2020

    The concept of data protection law

    Controlling informational risks through (not to) the right to data protection
    Dr. Max von Grafenstein
    …harm harm before before it it may may occur. occur. GENERAL REASONS FOR FOR A A RISK-BASED APPROACH A A risk-based approach may may be be preferable, for… …for example, if if harm harm cannot be be restored (e.g. (e.g. in in the the case case of of death)… … … or or if if it it is is difficult to to… …somebody knows knows something about about another one, one, it it is is impossible to to erase erase that that information… … … and and it it is is… …(e.g. IT security) prevent the risk to get more likely, i.e. turn into a specific risk. PROTECTION MEASURES Data protection measures prevent a specific…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 2/2020

    Impressionen von der PinG-Jahrestagung 2020

    …Betroffenenrechte, Frauen in der IT und Nachbesserungsbedarf, DSGVO-Compliance in großen, mittleren und kleinen Unternehmen, Sanktionen und Sanktionspraxis der… …Datenschutzaufsicht, Fragen zur Überregulierung der DSGVO. Fotos: Angela Kausche / Erich Schmidt Verlag Rechtsanwältin Nina Diercks zu Diversity im IT- und…
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 1/2020

    Towards bridging the gap between Privacy Terms and Humans through Information Visualization

    Kay Schröder, Batoul Ajdadilish, Dr. André Calero Valdez
    …project researchers proposed a novel approach on how to deal with the complexity of privacy policies: It automates reading and assessment of consumer… …this approach. Creative Commons (known as CC) is also another example which has been popularly used since 2001. The idea behind it is to encourage… …rights reserved”. Although CC ­licenses retain the full copyright, on the one hand, it allows the author to modify copyright terms and to specify how the… …work can be used by others, and on the other hand it communicates to others the legal permission regarding to what extent a work can be copied and used… …4: Creative Commons licences and layers 3 Visualization In order to facilitate the understanding from the user’s perspective with visual means, it is… …Calero Valdez PinG 01.20 9 vent them from “overlooking” the privacy terms. In addition, it is necessary to consider that the full text still needs to stay… …accessible to ensure the legal validity of the underlying privacy statement, but at the same time it is im­portant not to discourage the user by a too high… …much information as necessary and to provide information that is interesting for the average user at this point. Furthermore, it should prevent… …real counterpart (or reference) it represents. Especially abstract icons (e. g. a pause button within a music player) are usually a combination of shapes… …message. Even though the use of concrete icons seems to be particularly useful, it should not be forgotten that many contents—especially in data…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2020

    Once upon a crisis in Belgium

    Manual and digital contact tracing of the coronavirus
    Franck Dumortier
    …professionals to enter the required data into it. In addition, it may grant the federated entities access to such a database on a non-binding basis. 3 As for… …bridges some limits of the efficiency of manual contact tracing. After all, it is not always possible for an index person to remember exactly who he or she… …between the federal state and the federate entities – of which the content is not yet published, but the DPA had access to it and has already made public… …severe comments about it 11 – and, finally, a new Royal Decree 12 which was adopted without parliamentary debate nor prior opinions of the Council of State… …coronavirus in Belgium, it was rapidly decided to materially collect data from various healthcare providers, 14 to process these data in a centralized federal… …identifying the people they have been in contact with over the last few days. If it turns out that you are infected, a contact center will call you to review… …Decree is a federal governmental decree exercising ­legislation, or powers the federal legislature has delegated to the crown as secondary legislation. It… …persons by any means of communication, including by telephone, e-mail or by means of a physical visit, the DPA questioned “why it would not be not be… …Royal Decree n° 18 and articles 6, § 2, 12° and 9, § 1, 11° of Royal Decree n° 44. 34 It was not clear whether the notion “CT-scan results” in Decree n°… …. 37 DPA, Opinion n° 42/2020 of 25 May 2020, p.12. See also DPA, Opinion n° 46/ 2020 of 5 June 2020, p.3: “It doesn’t belong to the federal state to…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "Zeitschrift Interne Revision" Ausgabe 2/2020

    Buchbesprechungen

    Regine Strohbach, Ole Wertenbruch
    …Bereichen Umsatzsteuer, Informationstechnologie und Corporate Governance. Dabei erfolgt eine sinnvolle Unter teilung in Unterpunkte, welche die schnelle…
zurück 1 2 3 4 5 weiter ►
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • Cookie-Einstellung
  • |
  • AGB
  • |
  • Hilfe

Die Nutzung für das Text und Data Mining ist ausschließlich dem Erich Schmidt Verlag GmbH & Co. KG vorbehalten. Der Verlag untersagt eine Vervielfältigung gemäß §44b UrhG ausdrücklich.
The use for text and data mining is reserved exclusively for Erich Schmidt Verlag GmbH & Co. KG. The publisher expressly prohibits reproduction in accordance with Section 44b of the Copy Right Act.

© 2025 Erich Schmidt Verlag GmbH & Co. KG, Genthiner Straße 30 G, 10785 Berlin
Telefon: +49 30 25 00 85-0, Telefax: +49 30 25 00 85-305 E- Mail: ESV@ESVmedien.de
Erich Schmidt Verlag        Zeitschrift für Corporate Governance        Consultingbay        Zeitschrift Interne Revision        Risk, Fraud & Compliance

Wir verwenden Cookies.

Um Ihnen ein optimales Webseitenerlebnis zu bieten, verwenden wir Cookies. Mit dem Klick auf „Alle akzeptieren“ stimmen Sie der Verwendung von allen Cookies zu. Für detaillierte Informationen über die Nutzung und Verwaltung von Cookies klicken Sie bitte auf „Anpassen“. Mit dem Klick auf „Cookies ablehnen“ untersagen Sie die Verwendung von zustimmungspflichtigen Cookies. Sie haben die Möglichkeit, Ihre Einstellungen jederzeit individuell anzupassen. Weitere Informationen finden Sie in unserer Datenschutzerklärung.


Anpassen Cookies ablehnen Alle akzeptieren

Cookie-Einstellungen individuell konfigurieren

Bitte wählen Sie aus folgenden Optionen:




zurück