The code sets out the standards that online services need to meet in order to protect children’s privacy.
This work categorizes blockchain-based systems into a taxonomy based on differences in blockchain architectures, governance models, and other salient features. […]
The Principles have been designed to drive responsible data use by those businesses and on-line platforms developing and using facial recognition technology in commercial settings.
The standard processor agreement has been adopted by the Danish SA pursuant to art. 28(8) GDPR and aims at helping organisations to meet the requirements of art. 28 (3) and (4), given the fact that the contract between controller and processor cannot just restate the provisions of the GDPR but should further specify them, e.g. with regard to the assistance provided by the processor to the controller.
Guidelines establish requirements for credit institutions, investment firms and payment service providers (PSPs) on the mitigation and management of their information and communication technology (ICT) and security risks and aim to ensure a consistent and robust approach across the Single market.
These Guidelines are intended to help with the assessment of compliance of proposed measures with EU law on data protection.
The Guidelines aim to provide guidance on the grounds for submitting a request for the right to be forgottenand the exceptions to the right to be forgotten in regards of search engines.
French data protection authority CNIL has published document on use of facial recognition to start a debate about use of such technologies and their impact on privacy and data protection.
The aim of this guidance is primarily to assist controllers in identifying the correct legal basis for any processing of personal data.
EIOPA issues these Guidelines addressed to the supervisory authorities to provide guidance on how insurance and reinsurance undertakings should apply […]
his report provides details about the recognition process, notes where demographic effects could occur, details specific performance metrics and analyses, gives empirical results, and recommends research into the mitigation of performance deficiencies.
This document presents blockchain technology in detail and extensively studies its aspects relevant to IT security. It also assesses to […]