Kuketz-Forum: “Transportverschlüsselung bei E-Mails”
Technical discussion on transport encryption for emails (incl. striptls attacks in starttls)
https://forum.kuketz-blog.de/viewtopic.php?f=6&t=4992#p50638
ICO awareness material on secure communication of data
“Communicating the importance of information security to staff”
https://ico.org.uk/media/for-organisations/think-check-share/1043597/think-check-share-toolkit.pdf
Denmark: DPA criticizes insufficient mail encryption
On the basis of a complaint, the Data Inspectorate has considered that the use of the encryption form of the opportunistic TLS without further control in a specific case was not an adequate precaution.
The Data Inspectorate criticizes Lowell Danmark A / S (hereinafter Lowell) in a case where a citizen has complained that Lowell has sent confidential information about the citizen unencrypted over the Internet.
In a previous decision (January 2019-31-1263), the Data Inspectorate decided that the safeguards that Lowell had taken in the specific case on the basis of their risk assessment were appropriate. The use of opportunistic TLS was supplemented with a check whether the recipient domain supported TLS, and the risk assessment showed that in cases where the recipient domain was unable to receive TLS, a communication method other than email was used.
The difference between the present case and the previous decision was that Lowell in this case could not verify whether the recipient domain could receive TLS, and despite this lack of verification sent the email with opportunistically tuned TLS 1.2 – and thus Lowell could not prove , whether the email was actually received encrypted.
Therefore, in the present case, the Data Inspectorate finds that Lowell has not been able to demonstrate that the processing has been done in a way that ensures sufficient security for the personal data concerned, including protection against unauthorized access to personal data, using appropriate technical or organizational measures, cf. Article 5 (1) of the Data Protection Regulation. 2, cf. Article 32 (1) (f). 1 and 2.
UK: ICO – right of access (DSAR)
A Day in the Life of an AI project
IAPP conference presentation that breaks down what needs to be considered from a privacy point of view in the different phases of an AI project.
This could be the basis for a “checklist” for new AI experiments that are run on pre-assessed AI platforms.
Full slides from DPC19 :
https://iapp.my.salesforce.com/sfc/p/#1a000000HSGV/a/1P000000XeTO/7xOqxD1UampJRpDFr37qKWaLBKb9Ge2ZHgUUFBoiP6g
UK, ICO: Should you ask an individual for ID if they send in a DSAR?
It’s important that the requested information is necessary information and proportional.
https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-of-access/
Privacy Design Strategies by Jaap-Henk Hoepman (The Little Blue Book)
UK: ICO Guide to Privacy and Electronic Communications Regulations
Cookies, similar technologies, incl. trackers, ..
https://ico.org.uk/for-organisations/guide-to-pecr/