DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2016/3

2016 3

Main topic: eIDAS

 PUBLISHED: 27.9.2016

rr These articles were subject to peer-to-peer review

Click on headline to see more about article

Interview with Andreas Schurig

Jaroslav Dočkal
Editor in chief discusses with the representative of the Data Protection Supervisory Authority of the Stateof Saxony about the necessary changes in the operations of the companies, organizations and institutions becauseof GDPR Regulation.

eIDAS and its Practical Consequences rr

Martin Maisner, Josef Bátrla
The article analyses new developments in the electronic legal action and a new approach to electronic identities in the European Union space. It primarily focuses on measures to be taken to meet the requirements of the new regulation eIDAS.

What Brings eIDAS in the Field of Electronic Identifi cation? rr

Jiří Průša
Electronic identifi cation and its cross-border recognition represent one of the most signifi cant parts of the European eIDAS Regulation. This article describes how the eIDAS builds electronic identifi cation on mutual trust.

Slovakia and Delayed Preparation to Regulation eIDAS rr

Petra Vydrová
This article shows that preparations for eIDAS are quite delayed in Slovakia, both from the perspective of adopting the legislation needed and from the perspective of practical fulfi lment of duties directly prescribed by eIDAS.

Current and Future Data Protection Legislation rr

František Nonnemann
This article provides introductory analysis of the GDPR. The article compares the new EU legislation and the current Czech legal regime contained mainly in the Act No. 101/2000 Coll., On Personal Data Protection.

Some Aspects of the EU Regulation on the Protection of Personal Data rr

Vladimír Smejkal
EU regulation no. 2016/679 contains a number of aspects that change the current approach to privacy. In this article, attention is paid to the local scope of the regulation, relationship between the regulation and The EU directive no. 2016/680, regulating the processing of personal data for the purposes of criminal proceedings and imprisonment.

Pseudonymisation under the General Data Protection Regulation rr

Lenka Suchánková
Pseudonymisation is considered to signifi cantly reduce the risks to the data subjects concerned. The article shows how GDPR creates incentives for controllers to embrace pseudonymisation, in particular by relaxing the rules for the processing of pseudonymised data.

How to Defend against Ransomware rr

Jaroslav Dočkal, Martin Korec, Robert Šefr
Ransomware is fast becoming the bane of IT. This article aims to describe the problems associated with ransomware and how can IT users, companies, institutions and organizations protect themselves against this extremely unpleasant threat. The article also includes two case studies.

Analysis of Data Traffi c as a Cyber Security Incidents Prevention rr

Václav Stupka
Analysis of data traffi c is commonly used to achieve security of infrastructures. However, its operators often ignore relevant legislation. This article identifi es possible legal implications of the use of this technology and formulates conditions for its use from the legal perspective.

The Amendment of the Act on Cyber Security – Part I. rr

Martin Konečný
The European Union has recently published NIS directive that will have an impact on the current law on cyber security. The Czech Republic already has The Act on Cyber Security which has been effective since January 2015. The article describes requirements of the NIS directive, new defi nitions and new types of obligatory entities in the draft amendment of the Act on Cyber Security.

Forensic Analysis of Mobile Phones – Part III. rr

Jakub Kothánek, Jaroslav Kothánek
Third in a series of articles explains how to extract the data from a mobile phone with native operating system, system Symbian and Android. The article deals with connecting of the phone to forensic tools and right settings of the phone.

The Direction in which the National Security Team CSIRT.CZ is Going rr

Zuzana Duračinská
The article points to the changes that occurred in recent years on the grounds in the fi eld of security teams. The text deals with various types of security teams, challenges they have to face, as well as incidents they are solving.

back  Back...

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top