Processing personal data

You can access the entire course on our e-learning platform by logging in here.

If you do not have an account, you can try it for free.

Der Kurs

Über den Kurs

Nowadays, we receive so many communications with personal data even when we don’t expect it. Knowing about personal data is only part of the story – it is also important to know how to process personal data in the right way according to the GDPR. In this course, we show you the steps towards understanding how to process personal data.

files

Want to learn more?

At work, we all want to be helpful by sharing data and information, but we may unknowingly be causing a data breach. In this blog post, we will walk you through what a request for accessing personal data is, who should have access to personal data, and 4 concrete recommendations on how you can ensure that you are handling personal data properly.

Want to learn more?

At work, we all want to be helpful by sharing data and information, but we may unknowingly be causing a data breach. In this blog post, we will walk you through what a request for accessing personal data is, who should have access to personal data, and 4 concrete recommendations on how you can ensure that you are handling personal data properly.

files

Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.

In this way your employees willl be reminded of what to be aware of when they see a the posters.

Posters

Related courses

Save yourself from trouble
Kategorie: DSGVO

Save yourself from trouble

Learning objectives: Why it is important to save files to the company’s shared drive rather than to your own computer and the risks involved with locally saving files on your computer

Weiterlesen "
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.

Kontaktiere uns

Sie können uns jederzeit kontaktieren, um ein erstes und informelles Gespräch über Ihre Herausforderungen im Bereich der Cybersicherheit zu führen.