07th May 2024
Data protection in online trading

Data protection in online trading

It's crucial, that users’ personal data is protected, to protect their privacy. Many online retailers therefore rely on encryption technologies and strict security measures, to protect their customers’ data. Still, it's important to note, that absolute security cannot be guaranteed. It is also the responsibility of the users, to protect your data carefully, by using strong passwords and being careful with your personal information. Data protection in online trading is an extremely important issue. Lawyer Dipl.-Ing. Michael Horak, LL.M. Privacy policies should be transparent and provide users with clear information about them, how your data is used. It is also important, that users have control over their....

27th Nov 2023
Outsource to external service providers through IT outsourcing

Outsource to external service providers through IT outsourcing

IT outsourcing is a process, where companies or organizations outsource their IT tasks to external service providers. This can include a variety of IT tasks, such as the development of software, the management of networks, maintaining hardware and supporting end users. There are many reasons, why companies consider IT outsourcing. horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. One of the main reasons is cost savings. By outsourcing IT tasks, companies can reduce the costs of hiring and training IT staff. In addition, they can benefit from economies of scale, that arise through collaboration with an IT service provider. Another advantage of IT outsourcing....

26th Oct 2023
What regulation for artificial intelligence is the EU planning??

What regulation for artificial intelligence is the EU planning??

The European Commission has a white paper on artificial intelligence (Of) published. This white paper provides a comprehensive strategy and proposal for regulating AI in the European Union. Key elements of the White Paper included:: Classification of AI systems: The white paper proposed classifying AI systems into different categories, based on their risk level. This involved high-risk AI systems (with. B. autonomous driving, Healthcare) and lower risk for AI systems (with. B. Chatbots) differentiated. Regulation of high-risk AI systems: Stricter regulatory requirements have been proposed for high-risk AI systems, including certification requirements, transparency- and documentation requirements as well as clear regulations for monitoring and testing these systems. Data access and data provision: The white paper also emphasized fair access to data and....

14th Aug,en 2023
IT law as an important area of ​​law

IT law as an important area of ​​law

IT law is an important area of ​​law, dealing with the legal regulation of information technology and the use of computers and the Internet. It covers a variety of topics, including data protection, Copyright, Trademark, Contract law, liability issues and cybercrime. In today's digital world, IT law is of crucial importance for companies and individuals, use the technology. Businesses need to make sure, that they comply with applicable laws and regulations, to avoid legal problems and financial losses. Individuals also need to be aware, how to protect your personal data and what rights you have, when their data is collected and used by companies or government agencies. An important aspect of IT law is data protection....

13th Feb 2023
Purpose of IT security

Purpose of IT security

The purpose is to protect basic information such as company assets, company know-how, all personal data and sales. Without an appropriate solution for IT security, Does your company have inadequate risk management?. You, the management, are also legally obliged to do so, to take appropriate safety precautions. IT security means the protection of information and, above all, the processing of it. horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. Information security should prevent the manipulation of data and systems by unauthorized persons. IT security measures Access controls, Cryptography, rights management, Firewalls, Proxies, virus scanner, Vulnerability management – ​​these are the measures, to ensure IT security. IT security includes all technical and organizational....

06th Jan 2023

The Cyber ​​Attack, Trojans and viruses briefly explained

Everyone, who has ever experienced a system failure or suffered data loss, White, how vulnerable we are in the daily work in the office, in production and increasingly on the go. Especially those that have increased drastically in the recent past, Targeted attacks on company networks reveal the dimension of the problem. A successful attack can allow sensitive company data to fall into the wrong hands and destroy databases or even entire systems and, in extreme cases, endanger the existence of a company. It is therefore more important than ever: Prevention is better than cure! A well-considered safety concept, which is precisely tailored to the needs of a company, saves a lot of time and money in the event of damage or prevents it, that it was even...

12th Dec 2022
The legal side of IT compliance

The legal side of IT compliance

horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. In the area of ​​the IT landscape, legal regulations prevail, internal and contractual regulations. In corporate management, we can use the term IT compliance to describe compliance with regulations. Compliance means only in itself, that the applicable legal rules and recognized social values ​​and norms are always observed in the context of all corporate activities. Already in the light of the existing regulation density for companies and entrepreneurs, cross-border activities, Due to the increasing regulation and in particular the special liability for the management bodies, every company today has to operate a compliance management system. Lawyer Dipl.-Ing. Michael Horak, LL.M. Risky areas of IT compliance In particular, the...