Information Security Privacy management

Data protectie workshop

Workshop Data Protectie Volwassenheid Hoe volwassen is de gegevensbescherming en privacy echt binnen uw organisatie? Deze workshop geeft u inzicht in het volwassenheidsniveau van uw AVG compliance en legt op zakelijke wijze uit welke risico’s u loopt Spreker(s) Hans Kortekaas Richauna Ortega Pieter Houwen Omschrijving Met de ingang van de AVG in 2018 zijn er […]

Privacy
TikTok misleads, offers insufficient protection and uses unfair and unclear terms and conditions

TikTok misleads, offers insufficient protection and uses unfair and unclear terms and conditions

The Consumers’ Association and seventeen other European consumer organizations today filed a complaint against TikTok with the European Commission and the European network of regulators CPC. The complaints include the “unfair” copyright terms of TikTok, which gives the platform the right to reuse, distribute and reproduce videos without compensation to users, while these rights should […]

Privacy

Spy pixels in email becoming the new normal

The use of “invisible” tracking tech in emails is now “endemic”, according to a messaging service that analysed its traffic at the BBC’s request. 66% of emails sent to its users’ personal accounts contained a “spy pixel”, even after excluding for spam. Emails pixels can be used to log: (1) if and when an email […]

Cybersecurity Privacy
Lubach: politics is illiterate

Lubach: politics is illiterate

Lubach states that politicians are often digitally illiterate based on responses to GGD data leaks, secure digital meetings, encryption, Facebook session in the US, etc. with all the dangers this entails for society. Now this does not apply to all MPs. Fortunately, a digital committee has been set up…. Watch the video here: https://www.youtube.com/watch?v=TRNJN_GQnRA&t=2s

Cybersecurity

NWO has been hacked, applications, mail and office no longer accessible

None of the applications running on the NWO network is currently accessible, the organization writes. NWO email addresses and office software are no longer accessible. It is currently not possible to submit grant applications. It is unclear how the hack ended. has come about. Read more about this article here: https://www.rtlnieuws.nl/nieuws/nederland/artikel/5214692/wetenschapsorganisatie-nwo-hack-subsidieaanvragen-stilgelegd

Privacy
Rioting at the Capitol, watch your privacy settings!

Rioting at the Capitol, watch your privacy settings!

Key to bringing the mob to justice has been the event’s digital detritus: location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing. So when they stormed the Capitol their apps tracked them down and identified individuals from a trove of leaked smartphone location data. Read more about this article: https://www.nytimes.com/2021/02/05/opinion/capitol-attack-cellphone-data.html