Main topic: eIDAS
PUBLISHED: 27.9.2016
These articles were subject to peer-to-peer review
Click on headline to see more about article
Interview with Andreas Schurig
Jaroslav Dočkal
Editor in chief discusses with the representative of the Data Protection Supervisory Authority of the Stateof Saxony about the necessary changes in the operations of the companies, organizations and institutions becauseof GDPR Regulation.
eIDAS and its Practical Consequences
Martin Maisner, Josef Bátrla
The article analyses new developments in the electronic legal action and a new approach to electronic identities in the European Union space. It primarily focuses on measures to be taken to meet the requirements of the new regulation eIDAS.
What Brings eIDAS in the Field of Electronic Identifi cation?
Jiří Průša
Electronic identifi cation and its cross-border recognition represent one of the most signifi cant parts of the European eIDAS Regulation. This article describes how the eIDAS builds electronic identifi cation on mutual trust.
Slovakia and Delayed Preparation to Regulation eIDAS
Petra Vydrová
This article shows that preparations for eIDAS are quite delayed in Slovakia, both from the perspective of adopting the legislation needed and from the perspective of practical fulfi lment of duties directly prescribed by eIDAS.
Current and Future Data Protection Legislation
František Nonnemann
This article provides introductory analysis of the GDPR. The article compares the new EU legislation and the current Czech legal regime contained mainly in the Act No. 101/2000 Coll., On Personal Data Protection.
Some Aspects of the EU Regulation on the Protection of Personal Data
Vladimír Smejkal
EU regulation no. 2016/679 contains a number of aspects that change the current approach to privacy. In this article, attention is paid to the local scope of the regulation, relationship between the regulation and The EU directive no. 2016/680, regulating the processing of personal data for the purposes of criminal proceedings and imprisonment.
Pseudonymisation under the General Data Protection Regulation
Lenka Suchánková
Pseudonymisation is considered to signifi cantly reduce the risks to the data subjects concerned. The article shows how GDPR creates incentives for controllers to embrace pseudonymisation, in particular by relaxing the rules for the processing of pseudonymised data.
How to Defend against Ransomware
Jaroslav Dočkal, Martin Korec, Robert Šefr
Ransomware is fast becoming the bane of IT. This article aims to describe the problems associated with ransomware and how can IT users, companies, institutions and organizations protect themselves against this extremely unpleasant threat. The article also includes two case studies.
Analysis of Data Traffi c as a Cyber Security Incidents Prevention
Václav Stupka
Analysis of data traffi c is commonly used to achieve security of infrastructures. However, its operators often ignore relevant legislation. This article identifi es possible legal implications of the use of this technology and formulates conditions for its use from the legal perspective.
The Amendment of the Act on Cyber Security – Part I.
Martin Konečný
The European Union has recently published NIS directive that will have an impact on the current law on cyber security. The Czech Republic already has The Act on Cyber Security which has been effective since January 2015. The article describes requirements of the NIS directive, new defi nitions and new types of obligatory entities in the draft amendment of the Act on Cyber Security.
Forensic Analysis of Mobile Phones – Part III.
Jakub Kothánek, Jaroslav Kothánek
Third in a series of articles explains how to extract the data from a mobile phone with native operating system, system Symbian and Android. The article deals with connecting of the phone to forensic tools and right settings of the phone.
The Direction in which the National Security Team CSIRT.CZ is Going
Zuzana Duračinská
The article points to the changes that occurred in recent years on the grounds in the fi eld of security teams. The text deals with various types of security teams, challenges they have to face, as well as incidents they are solving.