EAID-Stellungnahme zum Entwurf der E-Privacy-Verordnung
Die Die EAID hat zum von der Europäischen Kommission vorgelegten Entwurf einer Verordnung des Europäischen Parlaments und des Rates über die Achtung des Privatlebens und den Schutz pensonenbezogener Daten in der elektronischen Kommunikation (Verordnung über Privatsphäre und elektronische Kommunikation) Stellung genommen. Zur Stellungnahme: https://www.eaid-berlin.de/?attachment_id=1710
Allowing employees to work away from the office, i.e., outside of the physical premises of the organization (otherwise known as “teleworking”) is becoming a common practice in the way to do business today. The ability to work remotely is seen as both a source of incentive for an employee’s productivity ...
Traditionally, information security has been perceived as an activity that was built around protecting sensitive information assets – after all, this is what the first (2005) revision of ISO 27001, and its predecessor BS 7799-2, also emphasized. These standards required companies to identify all the assets, and then build the ...
For outsiders, it’s not easy to distinguish among the specific purposes of Business Continuity Management (BCM), Information Security (IS), and IT Disaster Recovery (IT DR). All three areas have something to do with “security,” “losses,” “disasters,” and “protection.” Read on to learn more about the particular roles of disciplines often ...