This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
▪ The affected entities must register an overview of subcontractors ▪ Subcontractors are obliged to report security incidents ▪ The obligation of the affected ent... more...
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...