COMPLIANCEdigital
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • AGB
  • |
  • Hilfe
Hilfe zur Suche
Ihr Warenkorb ist leer
Login | Registrieren
Sie sind Gast
  • Home
    • Nachrichten
    • Top Themen
    • Rechtsprechung
    • Neu auf
  • Inhalt
    • eJournals
    • eBooks
    • Rechtsprechung
    • Arbeitshilfen
  • Service
    • Infodienst
    • Kontakt
    • Stellenmarkt
    • Veranstaltungen
    • Literaturhinweise
    • Links
  • Bestellen
  • Über
    • Kurzporträt
    • Mediadaten
    • Benutzerhinweise

Suche verfeinern

Nutzen Sie die Filter, um Ihre Suchanfrage weiter zu verfeinern.

Ihre Auswahl

  • nach "eJournal-Artikel"
    (Auswahl entfernen)
  • nach Zeitschriftenname
    (Auswahl entfernen)

… nach Suchfeldern

  • Inhalt (302)

… nach Jahr

  • 2025 (46)
  • 2024 (52)
  • 2023 (40)
  • 2022 (48)
  • 2021 (40)
  • 2020 (47)
  • 2019 (53)
  • 2018 (53)
  • 2017 (43)
  • 2016 (44)
  • 2015 (44)
  • 2014 (55)
  • 2013 (17)

Alle Filter anzeigen

Alle Filter entfernen

Am häufigsten gesucht

Kreditinstituten Fraud Ifrs internen Risikomanagement Rechnungslegung Praxis Anforderungen deutsches Deutschland Unternehmen Bedeutung Analyse deutschen Arbeitskreis
Instagram LinkedIn X Xing YouTube

COMPLIANCEdigital

ist ein Angebot des

Erich Schmidt Verlag GmbH & Co. KG

Suchergebnisse

582 Treffer, Seite 7 von 59, sortieren nach: Relevanz Datum
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 1/2021

    Between masks and curfews

    Critical synopsis of the guidance issued by national supervisory authorities on analogue and digital body temperature measurement in the context of
    István Böröcz, Olga Gkotsopoulou
    …body temperature readings. It further explores the guidance issued by national data protection authorities and proceeds with a thorough comparative… …europa.eu/news/en/press-room/20201024IPR90104/european-values-covid- 19-emergency-measures-pose-a-risk-of-abuse-of-power> accessed 29 ­October 2020. 3 It is noteworthy that rather quickly after the initial shudder and… …, 5 i. e. whether it is lawful and in accordance with the national data protection frameworks, triggered the response of the European Data Protection… …law practitioners, the authors use it throughout the text in parallel with the term ‘authorities’. 9 Gabriela Zanfir-Fortuna, ‘Thermal Imaging as… …of authorities deemed it indispensable to address such activities. The next section will provide a comparative overview of their reports and guidance… …: establishing the material scope, exploring the legal bases in different contexts, going as far as suggesting alternative measures, or keeping it rather short and… …measurement, for instance establishing a visitor database, then this processing would fall under the authority’s power and in principle, it is not permitted. 22… …November 2020. 24 It was not possible to identify the date of some documents, especially FAQs which appear to be updated regularly. The current publication… …(Art. 6 (1) (f) GDPR, with an exception of public authorities, as described in the GDPR), ­explaining that it cannot constitute a legal obligation. 46… …, 47 The French authority also recognises it as a possible legal basis for private organisations. 48 To the contrary, other authorities, such as the…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 6/2023

    DSGVO-Schadensersatzklagen aus Sicht von Klägern und Beklagten

    Streitgespräch Wybitul ./. Solmecke
    Tim Wybitul, Christian Solmecke
    …Internet- und IT- Branche spezialisiert. So hat er in den vergangenen Jahren insbesondere den Bereich Datenschutz- und Verbraucherschutzrecht der Kanzlei…
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 1/2022

    Künstliche Intelligenz statt menschlicher Prüfungsaufsicht?

    Zur Zulässigkeit des Online-Proctorings durch staatliche Hochschulen
    Thomas Britz, Dr. Moritz Indenhuck, RA Jan Max Wettlaufer
    …Fragen zum Einsatz von IT, insbesondere zur Vertragsgestaltung und dem ­Datenschutz. Künstliche Intelligenz statt ­menschlicher Prüfungs­aufsicht? Zur…
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2015

    Privacy regulation and its impact on the European economy

    Dr. Jana Moser
    …published. 2 It contains in its 79 pages a comparison of the main topics of the trilogue participants’ proposals that have been drafted in the past months and… …Nonetheless, it is quite challenging to forecast the economic value of data. Moreover, it does not matter if you call it “big data” or “smart data”, “business… …experts, it is the key to success. This is an undeniable fact that even the German federal government recently admitted, in stating: “A (often long-term… …insurance company, it is helpful if an advertiser can ensure that the banner will only be displayed to car owners in a special area (so-called “targeting”)… …compared to those arising from credit card, social network or health profiles. Consequently, it seems obvious that advertisement data profiles cannot… …generally be treated like any other personal data profile. Thus, it is misleading to determine profiling as generally being an intrusive means of data… …processing. As Recital 24 of the Council’s proposal has already pointed out, 11 only “when” an identifier is combined with other information can it be used to… …create profiles of a user and identify them. It is neither the identifier nor a profile or the possibility to identify someone using an identifier that… …endangers customers; rather, it is the purpose of data combination and the use of this combination that could have a significantly negative effect on an… …. It sets forth that consumers must have a right not to be subject to “profiling, which produces legal effects concerning him or her or significantly…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2018

    GDRP in a post-Brexit era: Some new challenges?

    Malcolm Dowden, Supuni Perera
    …within the regulatory reach of both the ICO and of an EU member state regulator. It is possible, that the ICO could work together with EU regulators to… …avoid double exposure. While GDPR Article 50 requires the EU commission and data law regulators to cooperate with third countries, it does not preclude… …compensation Under each regime, the data subject can seek compensation from the “closest, deepest pockets”, leaving it to the controllers and processors to… …in relation to each regime allows recovery of an appropriate proportion by the controller or processor who has paid “full compensation”. It is arguable… …, if the receiving country proves it is capable of providing adequate data protection. The EU Commission makes adequacy decisions both under GDPR and… …the UK to non-EU/EEA countries and not permit a transfer of data from the EU/EEA into the UK. It remains strongly advisable for organisations to rely on… …withdrawal. Even a small degree of divergence would involve cost and complexity for UK businesses. It is possible that the same data processing ­activities…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 6/2022

    The Data Act: A Missed Opportunity for Consumers

    Onntje Hinrichs
    …particularly important for consumers as it concerns co-generated Internet of Things (IoT) 9 data, i. e. data that results of actions of at least two actors, the… …manufacturer of a product and its user. 10 It lays down rules on access and use of data generated by connected products to ensure fairness in the allocation of… …consequences. Amazon‘s recent acquisition of the leading robotic vacuum cleaner company exemplifies the importance of IoT data for consumer privacy. It sparked… …fears that Amazon gained „yet another portal into our lives“ and could „map where we live, what we own, and what it should be selling to its hundreds of… …: https://www.theatlantic.com/ideas/archive/2022/08/amazon-roomba-irobot-acquisition-monopoly/671145/. to their data. First, it retraces the road to the Data Act Proposal and how it was preceded by discussions on the introduction of new property… …enables the free flow of data while simultaneously protecting fundamental rights. Second, it presents and analyses provisions of the proposal that impact… …consumers as well as their current shortcomings. Finally, it concludes by discussing potential remedies. II. The Road to the Data Act Proposal: Data as… …contracts, and de facto ownership positions via technical protection measures, none of these regimes create rights erga omnes. 17 It is property law that… …confers exclusive rights that can be invoked against more than a number of specific persons and it is precisely this universality that has been described as… …time data is excludable as it is not automatically available to all stakeholders. 19 Furthermore, it does not have intrinsic value since the value of…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 2/2022

    The criminal procedure in the 21st century – The trade-off between fundamental rights and new technologies

    Atanas Kirov, Denitsa Kozhuharova, Gergana Hristova, Snezhana Krumova
    …technologies Atanas Kirov / Denitsa Kozhuharova / Gergana Dzhadzheva / Snezhana Krumova As technology rapidly develops in every sphere of our daily lives, it is… …security. It offers critical interpretation in terms of the existing trade-offs casting a look into the future – how the balance could be maintained and what… …the European Union (CJEU) and national constitutions. As a result, it is regarded as a powerful legislative instrument that aims to ensure the… …instability of this nexus, technology has become an inseparable part of the human life and the risks that it carries with itself for the fundamental rights have… …been outweighed by the ­benefits that it provides to all spheres. This paper casts a look at three distinct fundamental rights – the right to privacy… …be made of the information it contains. II. The balance between the right to privacy and the security provided by new technologies. The right to… …degree it could be affected by the inclusion of the new technology in their life. Technology that could affect the privacy of individuals is neutral and it… …for the legal measures that prevent infringements of Article 8 ECHR and the privacy of individuals at national level. When it comes to the mere… …development of technologies preventing crime, it should be considered that it is equally as important to embed safeguards and benefit from the least intrusive… …by a private entity for law enforcement purposes if it is entrusted by virtue of national law. 12 There is a certain level of responsibility inherent…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 3/2015

    Connected and automated vehicles – Opportunities and challenges

    Dr. Wolfgang Bernhart
    …factors: Customers want it, technology enables it, legislation requires it and new functions need or improve from it. Customers want connectivity Drivers of… …of others for it – by using their smartphones while driving, for example, fig. 1. For young drivers in particular, remaining in the communication… …Alliance, founded by Google, and announced at the CES Las ­Vegas 2014. It promotes the use of “Android Auto”, applying the same concept as with the “Open… …Handheld Alliance” a couple of years before. With it, Google seems to aim for dominance of Android in car infotainment systems as well, also to get access to… …cost competitive – a tough task, since the suppliers business models rely on revenues from the OEM, and not from other sources, as it is the case with… …and likes and dislikes of the user together, new and improved functionality can be brought in cars: The car might ask you when once you have opened it… …station where you can pay with your tank card. It then automatically switches to the streaming service you have used on your smart phone and plays the title… …to drive back for 3 other hours, it also makes you suggestions for booking a table at an Italian restaurant, which you seem to prefer when having lunch… …automotive industry as we know it, Roland Berger Strategy Consultants, Munich/Chicago 2014. driven by the convergence of automotive and consumer electronics… …map-access for automated driving: This helps them to control access to vehicle data, to track IP addresses accessed by the vehicle and users and to combine it…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 1/2014

    Belgium Addresses Pitfalls for International Data Transfers

    Tanguy Van Overstraeten, Ronan Tigner
    …Finance. In practice, it is admitted since long that transfers based on standard contractual clauses could occur without Royal Decree. This is however not… …transfers from Belgium based on BCR remains, as it is required by the Privacy Act. However, the protocol greatly simplifies the process towards the granting… …case may be, liaises with the BCR applicant. When it considers that the BCR meet the requirements of the protocol, it communicates its positive advice to… …in turn submit the Royal Decree for signing by the King and have an extract of it published in the Belgian State Gazette. The benefits of this… …relation to this approval process, making it a truly reliable solution for global personal data transfers. It should also be noted that, since 2008, the… …processor transfers from the EU to a for- 9 E. g. WP74, WP154 and WP 155 mentioned in footnote 7. 10 For the sake of completeness, it must be noted that there… …. Once it con siders this to be the case, it informs the applicant and the Ministry. The Ministry will then require the Commission for the Protection of… …guidance. It defines under which conditions SCC may be viewed as conforming to the EU Template. The protocol also offers some flexibility. It provides that… …Template. The signing with multiple parties is particularly relevant as it allows, in one set of SCC, to cover a number of transfers which would otherwise… …Protection of Privacy. Where the Commission for the Protection of Privacy observes that the clauses are SCC, it notifies the applicant accordingly. As of the…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 4/2017

    NIS-Richtlinie und IT-Sicherheitsgesetz in 2017

    Simone Rosenthal, Frank Trautwein
    …Errichtung des Bundesamtes für Sicherheit in der Informationstechnik (BSI-Errichtungsgesetz, gültig vom 01. 01. 1991 bis 19. 08. 2009). Darauffolgend wurden… …dem BSI mit dem am 20. August 2009 in Kraft getretenen Gesetz zur Stärkung der Sicherheit in der Informationstechnik des Bundes (BSI-Gesetz) erweiterte… …Zielsetzung der europäischen Richtlinie ähnelt teilweise der des IT-­ Sicherheitsgesetzes: Vorgesehen ist ein ­hohes Sicherheitsniveau informationstechnischer… …Informationstechnik und Telekommunikation (Sprach- und Datenübertragung, Datenspeicherung und -verarbeitung) –– Transport und Verkehr –– Gesundheit –– Wasser… …für Sicherheit in der Informationstechnik bereits gut aufgestellt. Anders als im IT- Sicherheitsgesetz finden sich aber verbindliche Regelungen zu… …unternehmensinternen IT- Sicherheit. ­Folgende Aspekte sollen beim Schutz der IT-Infrastrukturen und -Systeme dabei besonders berücksichtigt werden: –– die Sicherheit… …Telekommunikationsunternehmen bei der Wiederherstellung der IT- Infrastruktur unterstützen oder technische Vor-Ort-Beratung eines Krankenhauses leisten, das von einer schädlichen…
    Alle Treffer im Inhalt anzeigen
◄ zurück 5 6 7 8 9 weiter ►
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • Cookie-Einstellung
  • |
  • AGB
  • |
  • Hilfe

Die Nutzung für das Text und Data Mining ist ausschließlich dem Erich Schmidt Verlag GmbH & Co. KG vorbehalten. Der Verlag untersagt eine Vervielfältigung gemäß §44b UrhG ausdrücklich.
The use for text and data mining is reserved exclusively for Erich Schmidt Verlag GmbH & Co. KG. The publisher expressly prohibits reproduction in accordance with Section 44b of the Copy Right Act.

© 2025 Erich Schmidt Verlag GmbH & Co. KG, Genthiner Straße 30 G, 10785 Berlin
Telefon: +49 30 25 00 85-0, Telefax: +49 30 25 00 85-305 E- Mail: ESV@ESVmedien.de
Erich Schmidt Verlag        Zeitschrift für Corporate Governance        Consultingbay        Zeitschrift Interne Revision        Risk, Fraud & Compliance

Wir verwenden Cookies.

Um Ihnen ein optimales Webseitenerlebnis zu bieten, verwenden wir Cookies. Mit dem Klick auf „Alle akzeptieren“ stimmen Sie der Verwendung von allen Cookies zu. Für detaillierte Informationen über die Nutzung und Verwaltung von Cookies klicken Sie bitte auf „Anpassen“. Mit dem Klick auf „Cookies ablehnen“ untersagen Sie die Verwendung von zustimmungspflichtigen Cookies. Sie haben die Möglichkeit, Ihre Einstellungen jederzeit individuell anzupassen. Weitere Informationen finden Sie in unserer Datenschutzerklärung.


Anpassen Cookies ablehnen Alle akzeptieren

Cookie-Einstellungen individuell konfigurieren

Bitte wählen Sie aus folgenden Optionen:




zurück