The present advice focuses specifically on the subject of digital autonomy and cybersecurity. Our ultimate challenge: How do we as the Netherlands maintain control over our democracy, rule of law and economic innovation system in the digital world?
This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple identifiers, pseudonyms with proof of knowledge and secure multi-party computation. It then applies some of these techniques in the area of healthcare […]
This document is intended to complement the Guidelines WP 250 and it reflects the common experiences of the Supervisory Authorities of the EEA since the GDPR became applicable.
these Guidelines provide clarification and transparency to market participants on the minimum expected information and cyber security capabilities.
These recommendations provide data exporters with a series of steps to follow, potential sources of information, and some examples of supplementary measures that could be put in place.
This thesis intends to look into these issues as to contribute to the debate on the implication of the data protection law (GDPR) on big data analytics.
Guidelines to the EU Member States and the European Commission on Interoperability Specifications for Cross-border Transmission Chains between Approved Apps.