All articles
Privacy: is synthetic data the solution to all evils?
News
Privacy: is synthetic data the solution to all evils?
The advent of Artificial Intelligence opens the door to the use of synthetic data, seemingly the panacea to all ills that winks at privacy. But is this really the case?
Privacy obligation: the disclosure of data recipients
News
Privacy obligation: the disclosure of data recipients
Holders of operation have an obligation to inform data subjects about the recipients: this is the ruling of the European Court of Justice in response to an Austrian subject's complaint
The specter of identifiability privacy
News
The specter of identifiability privacy
Among identifiable, de-identifiable and reasonably identifiable individuals, we analyze the levels of identifiability by clarifying all doubts.
Guarantor's clarification included in the Transparency Decree
News
Guarantor's clarification included in the Transparency Decree
Last year's Transparency Decree had introduced stringent new privacy obligations for employers, but raised some doubts about coexisting with the GDPR: doubts clarified by the Garante.
ISO 31700 to the rescue for privacy by design
News
ISO 31700 to the rescue for privacy by design
The concept of privacy by design born in the 1990s and actualized through the GDPR in 2016 evolves through the ISO 31700 standard consisting of as many as 27 requirements.
On Data Protection Day, Personal Data Sharing was released.
News
On Data Protection Day, Personal Data Sharing was released.
The European cybersecurity agency ENISA has popularized Personal Data Sharing with the aim of supporting GDPR compliance and encouraging the sharing of personal data.
Innovation does not rhyme with protection in ChatGPT
News
Innovation does not rhyme with protection in ChatGPT
Giant strides in technological innovation are not matched by adequate privacy protections. The speed with which ChatGPT use is spreading could pose a danger, given the poor privacy policy.‍
New year, new privacy decree on data breach
News
New year, new privacy decree on data breach
At the beginning of the year, the Privacy Guarantor issued a new decree aimed at strengthening notification requirements for privacy violations and defining a new taxonomy.
The password that unhinges the privacy wall is called Cellebrite
News
The password that unhinges the privacy wall is called Cellebrite
A digital bomb in everyone's hands: this is the meaning of fraudulently sharing instructions for using Cellebrite, the cyberespionage software
Give me the email I'll steal your car: dangerous bug discovered
News
Give me the email I'll steal your car: dangerous bug discovered
Cybercrime is sleep-deprived but equipped with a lot of creativity: the latest gimmick is the ability to steal cars through the owner's e-mail address.
Privacy of the deceased: who gets "the inheritance"?
News
Privacy of the deceased: who gets "the inheritance"?
Do the dead have the same privacy rights as the living? Who can handle the deceased's personal data, with what limits and through what processes? Here is what the legislation says about digital inheritance.
World Cup offside Privacy
News
World Cup offside Privacy
All European Guarantors are unanimous in calling the 2 apps to be compulsorily downloaded in order to participate as fans in the World Cup in Qatar as non-privacy-friendly.
In UK if you incite hatred on the web you have no right to Privacy?
News
In UK if you incite hatred on the web you have no right to Privacy?
The ongoing search for the ideal boundary between freedom of expression and respect for privacy is enriched by a new episode from across the Channel: in the UK, two police officers have been convicted for private messages on Whatsapp
Emotional algorithm under scrutiny by privacy watchdog
News
Emotional algorithm under scrutiny by privacy watchdog
Affective computing enables through artificial intelligence and biometric data to detect, express and reproduce human emotional feelings of users. Is it GDPR-proof?
Privacy: the best defense is Cyber Threat Attribution
News
Privacy: the best defense is Cyber Threat Attribution
Analyze the attack to identify the attacker and attribute responsibility to the culprit-this is the logic behind Cyber Threat Attribution. But how is it applied?
Fakeyou, the voice app that attracts the attention of the Guarantor
News
Fakeyou, the voice app that attracts the attention of the Guarantor
The Privacy Guarantor wants to shed light on the latest social gimmick: on Tiktok depopulates Fakeyou, the app that offers users the voices of famous people, offering the side to voice deepfakes.

Read our blog

Join other privacy enthusiasts and get Document Accountability Infographics, as well as news about the world of personal data, straight to your e-mail. Once a month, no SPAM.

Thank you for subscribing to our newsletter.
You will soon receive an email with the Document Accountability Infographic! 👈🏼
Oops, something went wrong when sending the request.