What is the Privacy Shield? The Safe Harbor Agreement’s successor raises questions for many stakeholders in the EU. Even if clear rules for data storage have been assured, there are still countless exceptions. However, the provisions for data storage are particularly important for online companies. This text provides an overview of the EU-US Privacy Shield agreement, which aims to establish legal [...]
In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.
If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to [...]
Website tracking is very important in online marketing to be able to see how users are interacting on your site. The first choice is normally the tracking tool offered by the search engine, Google. But for data protection reasons, more and more users are looking for alternatives to Google Analytics. There’s a great selection of web analytics tools – we will examine applications with similar [...]
If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?
E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to [...]
The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money [...]
The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when [...]
Tracking tools can provide website operators with a useful indication on how to adapt an online project to suit a target group. These tools focus on user profiles, which reveal how users find the website, and which content provokes interactions. This information is based on user data, which can be subject to stringent data protection guidelines in some countries within the European Union. Find out [...]
The search for the perfect software to meet your requirements of design and functionality for e-commerce can be a long and tedious affair. Some platforms just don’t quite give you the design you’re after, while others might look great but lack important shop functions like flexible payment methods, legal certainty, or optimization for mobile devices. PrestaShop was developed especially for [...]