Data Protection

Web analytics and data privacy

Tracking tools can provide website operators with a useful indication on how to adapt an online project to suit a target group. These tools focus on user profiles, which reveal how users find the website, and which content provokes interactions. This information is based on user data, which can be subject to stringent data protection guidelines in some countries within the European Union. Find out [...]   

Deleting a Google result and protecting personal data

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when [...]   

Alternatives to Google

Numerous companies and nonprofit organisations offer web search services beyond the Google algorithm. The competition is usually stuck with an outsider status but they also present interesting approaches and innovative business models that don’t necessarily rely on the advertising industry. The trend toward anonymous web searches is also starting to appeal to more and more users, meaning that [...]   

ePrivacy Regulation: About the EU’s privacy policy

The EU plans to significantly tighten data security online: With the ePrivacy regulation, the collection of personal data should only be allowed following explicit allowance. At this point, it’s not certain what exactly will be included in the ePrivacy regulation: We’ve consolidated for you here what we already know. As website operators, it makes sense to inform yourselves now as to which changes [...]   

Terminal Servers – the Secret Behind Remote Hosts

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.   

E-mail marketing trends

To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss these e-mail marketing trends in 2018: more automation possibilities, new design options, stricter data protection, and things that are made possible thanks to artificial intelligence. In our article on this year’s newsletter trends, we explain what you should look for in your future strategies and [...]   

Using SSH keys for your network connection

Operating and managing a remote server located in a data centre is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But [...]   

What is Big Data?

When we shop online, book holidays, and search for gift ideas, we hardly give a second thought to the fact that each search entry leaves behind a trail of our identity. Busy web bots are never far behind and sweep up this information. The result of all of this is Big Data: massive volumes of data that is analysed and used for a variety of reasons. But is there reason to be wary of leaving behind [...]   

Social plugins and privacy

For website operators looking to increase their outreach, the advantages of social media buttons are obvious; content can be spread and followers can be generated with just one click of the ‘Tweet’ button, the ‘Like on Facebook’ social plugin, or the ‘Follow on Instagram’ link. These helpful extensions are great tools for expanding an internet presence, but critics warn that these plugins don’t go [...]   

Online identity theft protection

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just merely screenwriters’ fantasies; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of the [...]