This study reviews the main legal and regulatory challenges associated with online platform (OP) operations and analyses the incentives for OPs, their users and third parties to detect and remove illegal or harmful and dangerous material, content and/or products.
This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple identifiers, pseudonyms with proof of knowledge and secure multi-party computation. It then applies some of these techniques in the area of healthcare […]
This document is intended to complement the Guidelines WP 250 and it reflects the common experiences of the Supervisory Authorities of the EEA since the GDPR became applicable.
This Study discusses the concept of “European Digital Sovereignty”, opportunities opened by the concept but also the risks and pitfalls.
these Guidelines provide clarification and transparency to market participants on the minimum expected information and cyber security capabilities.
The aim of the guidelines is to provide elements to examine, whether surveillance measures allowing access to personal data by public authorities in a third country can be regarded as a justifiable interference or not.
The report provides law enforcers, policymakers and other organisations with information on existing and potential attacks leveraging AI and recommendations on how to mitigate these risks.
These recommendations provide data exporters with a series of steps to follow, potential sources of information, and some examples of supplementary measures that could be put in place.