Guides
Filters
37 results
-
A Guide to Privacy by Design
The final goal is to ensure that data protection is present from the early stages of development and not a layer added to a product or system. Privacy should be an integrated part of the nature of said product or service.
-
Introduction to the Hash function as a personal data pseudonymisation technique
This document analyses the sources of risk of reidentification in application of hash techniques, and establishes the need to carry out an objective analysis of this risk in order to determine whether this pseudonymisation or even anonymisation technique is appropriate
-
DNS Privacy
Despite the increase in Internet privacy awareness, the DNS protocol is probably the Great Ignored. This note identifies the privacy problems that the use of the DNS protocol may entail and the implications that the illegitimate processing of such data could have. In turn, it identifies the...
-
GDPR Compliance of Processings that Embed Artificial Intelligence. An Introduction
In this document, we will focus in ensuring that any processing including weak AI components are compliant with the GDPR.
-
Guidelines for Implementation of the Eighth Additional Provision and Twelfth Final Provision of the LOPDGDD
Act 39/2015, of 1 October, on Common Administrative Procedure of Public Entities establishes, on article 28, that submitting documents within an administrative procedure is both a right and a duty.
-
-
Recommendations to Protect Personal Data in Situations of Mobility and Telecommuting
Below, a set of recommendations for the data controller is listed that the data controller will need to adapt to the specific situation of their business purposes.
-
Technologies in the Fight against COVID19
In this document, a brief analysis will be carried out about some of the technologies in the fight against COVID-19.