Category: Post

Cybersecurity and its impact on users

Cybersecurity and its interaction with the users are yet to be widely explored. Despite existing reports and researches about cyberthreats in the field, there is still much work to be done to secure one’s activity online. The below information frames the definition of cybersecurity tools and its impact on general population.

GDPR certification: The principal tool to demonstrate personal data protection compliance (Part 2)

As already established, a GDPR Certification is the optimal solution to ensure compliance with legal requirements and inspire confidence in data processing activities. Nonetheless, choosing a suitable certification scheme that will ensure the goals are sufficiently met is not always an easy process. In this context, Europrivacy is the certification scheme that offers precisely those benefits necessary leading to an effective GDPR certification.

GDPR certification: The principal tool to demonstrate personal data protection compliance (Part 1)

Following the adoption of the General Data Protection Regulation (GDPR), the importance of data protection and privacy is constantly increasing both for EU citizens and entreprises operating in the Union. In this privacy-centric environment, we present how and why a GDPR certification is an optimal solution to demonstrate compliance and increase trust in a business’ operations.

An automatic text labelling framework to promote digital privacy in the Android ecosystem

Natural language texts are still a relatively unexplored data source in the quest for digital privacy. Leveraging this, we present an automatic labelling of texts related to Android apps. This framework relies on state-of-the-art Natural Language Processing (NLP) and deep learning techniques and will be accessible from a user-friendly dashboard.

Issues with targeted political advertising

What can we do when a technology created to promote commercial products is used to influence people’s political opinions?

Keep your partners at bay: On the importance of validating third-party SDKs

In Android, most apps include functionality from third-party libraries (SDKs) in an attempt by developers to reduce the cost of building an app. However, it is important to understand the privacy risks that these SDKs can pose to the users of the app. In this blog post, we discuss these risks, as well as why it is important that developers understand the type of content that third-party libraries are including in their app.

Ethical Impact Assessment for TRUST aWARE

By providing tools for key Protecting privacy and digital security are becoming increasingly important in everyday life. A lack of trust in software and how it deals with or exposes personal information could negatively impact consumers and the wider EU digital market. Privacy, security and trust in software are promoted by the TRUST aWARE project. They are also, in themselves, philosophical and ethical concepts, but what do they mean in the context of TRUST aWARE?

TRUST aWARE: Transforming the Security & Privacy (S&P) vicious cycle into a virtuous one

By providing tools for key stakeholders along the whole cycle, and supporting cooperation and intelligence sharing, TRUST aWARE will minimise the impact of cyberthreats, empowering users, promoting collective awareness, and encouraging trustworthy S&P-preserving digital products in compliance with regulation.

error: Content is protected !!