Data protection

Data protection is very important to us. Not only because we are affected ourselves and because we are fed up with the daily horror reports. Just like accessibility, we place data protection at the very beginning of every project. What data do we collect, how long do we have to keep it, how do we protect ourselves? Privacy by design is a building block on the road to success. Intelligent solutions based on free software on servers located in Germany are another. Regular audits of the architecture and implementation are also part of this.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Ever wondered if the person with the business card is really who they say they are? Lead acquisition made easy and in compliance with data protection laws.

Author
Profile picture for user DeepL
Profile picture for user luckow

Stephan Luckow

How can you share passwords securely when you communicate via channels and mails without encryption? A small, fine tool makes it possible.
Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

How can you protect yourself against Trojans in application e-mails? By accepting the documents exclusively via the website.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

What to do if you have caught ransomware, your hard disk data has been encrypted and a ransom is demanded for its release?
Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Mail sensitive data is only GDPR-compliant with SSL encryption or via password-protected PDF. Nextcloud is a convenient alternative.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

The Google package G Suite for Education can be used by educational institutions free of charge. This may be cheap, but it is tricky in terms of data protection.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

What simple technical and organisational measure can be taken on the computer to prevent access to personal data by third parties?