Why read cookie policies?

abstract business code coder

Each time you visit a website, the first thing you notice is the cookie acceptance window that the website uses. You often accept them without paying much attention to them, because you simply want to use the website and not waste time on additional reading. But, what exactly do you accept and how can it …

Will Digital Revolution Eat Its Children?

On 14 June 2022, IT system of the Serbian State Cadastre, the public platform containing data on real estate (land, parcels, houses, apartments..) and its owners, was subject to a hacker attack. According to the Cadastre officials, in order to prevent the damage to infrastructure and preserve the data, the system was locked, both for …

ATIC hosts Conference on Personal Data Protection

On June 28, the National Association of ICT Companies (ATIC) in collaboration with the National Centre for Personal Data Protection (NCPDP) and the ABA Roli of Law Initiative Project “Personal Data Protection – Rights and Obligations in the Republic of Moldova” have organized the Conference on Personal Data Protection to strengthen the collaboration in the …

Is More Repression Less Repression?

Blog Post Author- Milena Vasic, Attorney at law At the beginning of October, the Draft Amendments to the Criminal Code was published on the website of the Ministry of Justice, with a public hearing deadline of 20 days. We haven’t had the opportunity to hear the Minister of Justice, to instruct us in the changes …

MYLA concludes the project with a round table with stakeholders

On 28.06.2022, MYLA organized the final event of the project – a round table with stakeholders relevant to personal data protection and the high schools included in the project. The event was attended by representatives from three high schools (the fourth high school has opted out of the project), representatives from the Personal data protection …

The draft law on ensuring security of information space: risks of tacit presumption of guilt for the virtual environment in Moldova

The legislative initiative to amend certain regulations aimed at ensuring the security of information space (draft to the Parliament of Republic of Moldova 123/2022) raises numerous questions in terms of maintaining a balance between freedom and security issues, as well as the use of formulations that can be interpreted ambiguously, which carries the risk of …

The use of some electronic services in North Macedonia has increased, but it is far from the desired level

apple apple devices blur cellphone

The use of certain electronic services during 2021, compared to the period 2019/20 has slightly increased. This is shown by the data provided by ICEDA in cooperation with Portalb.mk, comparing them with the data from the preliminary research, when the same electronic services were used less. However, the increase is still far from the level …

Digital Security Online Training for Civil Society

The Lawyers’ Committee For Human Rights (YUCOM) organized an online training “Digital Security of Human Rights Activists”, on April 18, 2022. While cyber-attacks are on the rise, many CSOs have unprotected data and insufficient cyber security protocols, making them vulnerable to data loss. To fight this, organizations must priorities enacting digital security best practices. The …

Cross-border transfer and free movement of personal data

With the approval of Law no. 17/2007 on the protection of personal data, the legal requirement has established that personal data may be transferred across borders only if adequate stages of protection are provided, for instance: 1.To countries that ensure an adequate level of protection of personal data: The willingness of the countries to ensure …