13th Feb 2023
Purpose of IT security

Purpose of IT security

The purpose is to protect basic information such as company assets, company know-how, all personal data and sales. Without an appropriate solution for IT security, Does your company have inadequate risk management?. You, the management, are also legally obliged to do so, to take appropriate safety precautions. IT security means the protection of information and, above all, the processing of it. horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. Information security should prevent the manipulation of data and systems by unauthorized persons. IT security measures Access controls, Cryptography, rights management, Firewalls, Proxies, virus scanner, Vulnerability management – ​​these are the measures, to ensure IT security. IT security includes all technical and organizational....

12th Dec 2022
The legal side of IT compliance

The legal side of IT compliance

horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. In the area of ​​the IT landscape, legal regulations prevail, internal and contractual regulations. In corporate management, we can use the term IT compliance to describe compliance with regulations. Compliance means only in itself, that the applicable legal rules and recognized social values ​​and norms are always observed in the context of all corporate activities. Already in the light of the existing regulation density for companies and entrepreneurs, cross-border activities, Due to the increasing regulation and in particular the special liability for the management bodies, every company today has to operate a compliance management system. Lawyer Dipl.-Ing. Michael Horak, LL.M. Risky areas of IT compliance In particular, the...

10th Dec 2019
No entitlement to regulatory required intervention in a data protection supervisory matter

No entitlement to regulatory required intervention in a data protection supervisory matter

The parties disagree about the intervention of the defendant in a privacy supervisory matter. The plaintiff asked the Kreissparkasse ... ... ... repeatedly, his ... ... ... shared her personal data processed by him to übermitteln.3Die Kreissparkasse the applicant by letter of 30. July 2018 then with, to him in compliance with Art. 15 Abs. 1 and 2 to the Privacy Regulation (DS-ACE) such as § 34 the Federal Data Protection Act (BDSG) now convey its data (vgl. leaf 3 – 6 the court record, Conditioning the application). With a further letter of the same day, the Kreissparkasse told ... ... ... the plaintiff nor the credit rating his person with. By letter of 3. September 2018 turned ...

24th Aug,en 2017
Die dynamische IP-Adresse stellt für den Anbieter der IP-Adresse ein personenbezogenes Datum dar

Die dynamische IP-Adresse stellt für den Anbieter der IP-Adresse ein personenbezogenes Datum dar

a) Die dynamische IP-Adresse, die von einem Anbieter von Online-Mediendiensten beim Zugriff einer Person auf eine Internetseite, die dieser Anbieter allgemein zu-gänglich macht, gespeichert wird, stellt für den Anbieter ein personenbezogenes Datum im Sinne des § 12 Abs. 1 and 2 TMG in Verbindung mit § 3 Abs. 1 BDSG dar (Fortführung von EuGH NJW 2016, 3579). b) § 15 Abs. 1 TMG ist entsprechend Art. 7 BUCHST. f der Richtlinie 95/46 EG dahin auszulegen, dass ein Anbieter von Online-Mediendiensten personenbezogene Da-ten eines Nutzers dieser Dienste ohne dessen Einwilligung auch über das Ende eines Nutzungsvorgangs hinaus dann erheben und verwenden darf, soweit ihre Erhebung und ihre Verwendung erforderlich sind, um...

15th Apr 2013
Privacy law

Privacy law

Due to the high, easy availability of data, their predictability and processing in databases or other computerized systems is a policy of the central facets of current and future legal realities represent. The protection of data is not solely in orginären Privacy Legal, but also in many other areas of law, such as intellectual property law and copyright (unauthorized Down-/Uploads protected works, Database right), Application. In addition to its general data protection law many domain-specific data protection provisions in other laws. These are the general rules of the respective national data protection laws and the Federal Data Protection Act (BDSG) ago ( § 1 Abs. 3 and 4 BDSG). The state data protection laws apply to the processing of personal data by public authorities and other public bodies of the state and municipalities ...

09th Apr 2013
Why are we involved in IT-/TK-Recht?

Why are we involved in IT-/TK-Recht?

We know the IT-/TK-Branche of our clients as well as by the special off- and training of our Lawyers. Thus, since we now have 16 Years active in the field of IT-/TK-Rechts Attorney Dipl.-Ing. Michael Horak graduated alongside his jurisprudential studies such electrical engineering with appropriate emphasis in the areas of information technology / telecommunications. Of course we know the terminology and industry relationships. In addition, we are able in particular complicated technical issues as the other institutions of the justice prepare, that the actual technical problems can be recognized and honored accordingly. Accurate and fast we can tap into, what matters. What services we offer? The entire right of information technologies and telecommunications, including the ...