Inhaltsverzeichnis
Welche E-Mail Datenschutz?
Nutzen Sie in E-Mail-Verteilern immer das Bcc-Feld für die E-Mail-Adressen, sodass keine Einsicht in die E-Mail-Adressen aller Empfänger besteht. Wenn Sie E-Mails mit sensiblen Daten verschicken, nutzen Sie eine Software oder einen E-Mail-Anbieter mit Ende-zu-Ende-Verschlüsselung.
Was ist eine unverschlüsselte E-Mail?
Sind sie unverschlüsselt, können sie auf jedem Server von Angreifern mitgelesen werden. E-Mails können aber auch auf ihrem Weg von einem Server zu einem anderen von Kriminellen abgefangen und ihr Inhalt verfälscht werden. Weder Sender noch Empfänger bekommen davon etwas mit.
Is your email subject to the GDPR?
While we may not think of email as subject to the European Union’s General Data Protection Regulation (GDPR), your mailbox in fact contains a trove of personal data. From names and email addresses to attachments and conversations about people, all could be covered by the GDPR’s strict new requirements on data protection.
Do you have the right to erasure data under GDPR?
Under GDPR, people have the right to erasure, otherwise known as the right to be forgotten. If any recipient asks for their email address to be removed from a mailing list, you need to do it immediately. Also, if an individual requests that any data stored about them is deleted, you are legally bound to do so.
What does the GDPR mean for your business?
The GDPR requires “data protection by design and by default,” meaning organizations must always consider the data protection implications of any new or existing products or services. Article 5 of the GDPR lists the principles of data protection you must adhere to, including the adoption of appropriate technical measures to secure data.
Does ProtonMail comply with GDPR?
(Disclosure: GDPR.eu is run by ProtonMail, the world’s largest encrypted email service, and funded in part by the European Union’s Horizon 2020 Framework Programme.) While encryption is not required, it is up to every organization to develop a rationale for developing the most appropriate data security practices.