Guides
Filters
37 results
-
10 Misunderstandings Related to Anonymisation
-
Guide on Personal Data Breach Management and Notification
This guide is designed for different data controllers processing personal data who could be affected by data security breaches, with the aim of enabling understanding of the GDPR regarding its requirement to notify the competent authority and, when relevant, the data subjects, so that the competent...
-
Risk Management and Impact Assessment in the Processing of Personal Data
This document is a guide to the management of risks to the rights and freedoms of data subjects applicable to any processing operation, regardless of the level of risk. In addition, and for cases of high-risk processing, it incorporates the necessary guidelines for carrying out the Data Protection...
-
10 Misunderstandings about Machine Learning
Machine learning (ML) is a specific branch of AI, applied to the resolution of specific and limited problems - such as classification or prediction tasks. Unlike some other types of AI that try to distill human experience (e.g., expert systems ), the behaviour of machine learning systems is not...
-
Guidelines on Cookies and Web Analytics in Public Administration Websites
The purpose of this document is to offer guidelines about the use of cookies and similar technologies in websites of Public Administrations, especially when it comes to the use of web analytics services. It is addressed to data controllers in the Public Sector and their data protection officers.
-
Guidelines for conducting a data protection impact assessment in regulatory development
The purpose of these guidelines is to serve as a guide for carrying out a data protection impact assessment (DPIA) in the framework of the preparation of the Regulatory Impact Assessment Report (RIAR), when legislative initiatives involve the processing of personal data.
-
Guidelines for the validation of cryptographic systems in data protection processing
These guidelines outline the elements that it is recommendable to assess in the design and validation of an encryption system used in the processing of personal data, taking into
account the importance of that system in such processing, and especially focused on those cases in which encryption is... -
Guidelines Clocking and Attendance Control Processing Using Biometric Systems