The Intelligence Agency was set up by the Ministry of Social Affairs to assist municipalities in assessing applications for benefits and transmitting “signals” of possible fraud, based on large-scale processing of data from citizens. The Dutch Data Protection Authority fears that citizens may again become victims of unlawful and non-transparent government actions and asks the […]
The idea of global vaccination and health data being stored in centralized systems has many privacy experts freaking out. As the first vaccines against COVID-19 roll out, governments and institutions across the world are scrambling to figure out how to provide proof that someone has been vaccinated. Paper certificates, PDFs, wristbands and mobile apps have […]
The EDPB advises you to know your transfers. Mapping all transfers of personal data to third countries to ensure that it has an equivalent level of protection wherever it is processed. You must also verify that the data you transfer is adequate, relevant and limited to what is necessary in relation to the purposes for […]
The Cyber Security Council is a national and independent advisory body to the cabinet. They are concerned about the growing dependence on the Netherlands when it comes to the use of new technological applications or services from foreign tech companies. This can lead to potential vendor lock-in and in exceptional cases possible access to data […]
The European Commission is going after cloud computing, the online data storage business dominated by big American companies. A draft bill seeks to address concerns about dependence on a small group of providers: chiefly Amazon Web Services, Google Cloud, IBM Cloud and Microsoft Azure. The bill creates an oversight system designed “to preserving the […]
Last Thursday in the Northern District of California, Brittany Conditi filed a class-action complaint against Instagram and its parent company Facebook for invasion of privacy alleging that Instagram accessed users’ smartphone cameras when not using features that would require camera access, despite the defendants’ representations to the contrary. Specifically, the party who initiated the lawsuit […]
The Ministry of Justice and Security is investigating whether Google complies with the privacy rules. This is done with the help of a data protection impact assessment (DPIA). Expected completion of this DPIA is in the autumn. The wish arose from education where digitization took place at breakneck speed, not knowing whether these parties that […]
According to researchers at the American Ponemon Institute, cyber attacks are the leading cause of data leaks, followed by technical defects, configuration errors in the cloud and human error. The “Cost of a Data Breach Report 2020” study conducted by IBM among 3,200 people from 524 organizations shows that the average cost per leaked or […]
With the Central Government’s CopyID app, you can cross out the identity details in a copy of your identity document that organizations do not need or are not allowed to process. This can be, for example, the citizen service number (BSN), but also a passport photo or signature. This depends on the organization and purpose […]
A desk clerk had difficulty logging into the hospital information system and asked aloud “How do I log in?” To a colleague who also had a patient in front of the splash screen.Then the login code and then the password were loud and audible for everyone. In hospitals people are notoriously careless, careless and thoughtless […]