Data Protection

S/MIME: the standard method for e-mail encryption

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to ensure privacy with your post, e-mail encryption helps to ensure privacy with e-mails. The guide reveals why the standard S/MIME procedure is suitable for this purpose and how it ensures your e-mails arrive safely. [...]  

Alternatives to Google

Numerous companies and nonprofit organisations offer web search services beyond the Google algorithm. The competition is usually stuck with an outsider status but they also present interesting approaches and innovative business models that don’t necessarily rely on the advertising industry. The trend toward anonymous web searches is also starting to appeal to more and more users, meaning that website operators should take these alternatives to Google seriously. [...]  

Tips for better website security

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions can you be sure that your data stays out of the hands of criminals. [...]  

Image copyright online

Just because a photograph or artwork is available to view on the internet, doesn’t mean that you can use it for your own purposes. The creator’s consent and payment for royalties are often required. The rules don’t solely apply to sharing images that don’t belong to you; even if you use your own, you have to stick to certain guidelines. [...]  

What do EU cookie laws mean for you?

Online cookies used to track behaviour online are commonplace in the modern internet world, serving many functions, from storing login information to telling websites which pages you visit. In 2011, EU member states implemented their respective cookie policies, dictated by amendments made in 2009 to the EU directive for privacy and data protection online. But what do these rules mean for UK businesses? And do they affect US website operators? [...]  

Social plugins and privacy

For website operators looking to increase their outreach, the advantages of social media buttons are obvious; content can be spread and followers can be generated with just one click of the ‘Tweet’ button, the ‘Like on Facebook’ social plugin, or the ‘Follow on Instagram’ link. These helpful extensions are great tools for expanding an internet presence, but critics warn that these plugins don’t go far enough to protect users’ privacy, potentially even breaking EU legislation. Find out more about the current legal situation and how you can avoid running into legal issues here. [...]  

The best Google Analytics alternatives

Website tracking is very important in online marketing to be able to see how users are interacting on your site. The first choice is normally the tracking tool offered by the search engine, Google. But for data protection reasons, more and more users are looking for alternatives to Google Analytics. There’s a great selection of web analytics tools – we will examine applications with similar features to those offered by Google Analytics. [...]  

Finding a website host: how to search successfully

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays? [...]  

What is the EU-US Privacy-Shield?

In the end, it is evident that personal data transfer to the U.S. will continue to be an uncertain field for companies. The transfer of data to the U.S. remains within the framework of the currently applicable regulations rather than a legal grey zone. The companies concerned are advised to closely monitor any developments in data protection law. At the beginning of 2017, the EU Justice Commission announced a more detailed examination of the Privacy Shield regulations in the wake of the formation of President Trump’s government. [...]  

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organiser and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to e-mail accounts, and what you can do to regain control of your account if the worst does happen. [...]