Summons
(alleged ransom payment, disguised via Bug Bounty program, in wake of 2016 data breach [Amazon S3 bucket credentials on github])
https://www.justice.gov/usao-ndca/press-release/file/1306781/download
[protecting people by good design, solid security, efficient processes and trusted services]
Summons
(alleged ransom payment, disguised via Bug Bounty program, in wake of 2016 data breach [Amazon S3 bucket credentials on github])
https://www.justice.gov/usao-ndca/press-release/file/1306781/download
< href="https://www.theverge.com/2020/7/31/21349538/google-changes-ads-data-cookies-privacy">https://www.theverge.com/2020/7/31/21349538/google-changes-ads-data-cookies-privacy
On the 17 of July 2020, the High-Level Expert Group on Artificial Intelligence (AI HLEG) presented their final Assessment List for Trustworthy Artificial Intelligence.
In case you are need for some inspiration in the wake of Schrems II..
https://ico.org.uk/media/for-organisations/documents/1529/assessing_adequacy_international_data_transfers.pdf
https://lfd.niedersachsen.de/download/156382/FAQ_zur_Auftragsverarbeitung_nach_Art._28_DS-GVO.pdf
Blog article with some commentary
https://www.delegedata.de/2020/07/datenschutzbehoerde-niedersachsen-umfassende-faq-zur-auftragsverarbeitung-nach-der-dsgvo/
Interesting note on contracts.
Evaluating the level of risk for a personal data processing operation
https://www.enisa.europa.eu/risk-level-tool/risk
includes further links to risk assessment methodologies
Interesting report that also points out the wide variety in DPIA formats and sizes.
It also talks about specific passages and questions used.
https://edps.europa.eu/sites/edp/files/publication/20-07-06_edps_dpias_survey_en.pdf
Additional EDPS guidance:
https://www.cnil.fr/fr/opendata
Quite a few interesting data sets published by CNIL as Opendata, incl. e.g.