Skip to main content

Internet & Technology

Cross-border transfer of personal data

The cross-border transfer of personal data is subject to special rules.

Data processing in the cloud

There are a number of aspects of data protection that you should pay particular attention to when using cloud services. These include (i) the use of processors and sub-processors, (ii) the security of data processing and (iii) the transmission of personal data to third countries.

Factsheet with practical suggestions for ethical hackers

White hat hacker

Guide to elections and voting

Anyone who processes data in the context of elections and votes must be aware that information on political and ideological views is classified as sensitive.

Information security

On this page you will find important information and instructions relating to IT and information security.

Outsourcing of data processing

You remain responsible for data protection even if you entrust their processing to a sub-contractor.

Privacy statements on the internet

Who needs a privacy statement and what should it contain?

Search engines

Search engines make information that was published on the internet at a certain point in time accessible to everyone... including information that one would sometimes rather forget.

Tracking - personality profiles can emerge from seemingly irrelevant data

Tracking programmes alert third parties when you click on a link, interact with an advertisement, watch a video, etc. These isolated pieces of information may not mean much on their own, but the sum total can allow conclusions to be drawn on significant aspects of your personality.