Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Global privacy alarm raised for AI without consent
  • EU AI Act
  • Privacy
February 23, 2026
1 minute read
The future of legally binding digital signing in Europe
  • EIDAS
February 18, 2026
1 minute read
When Palantir-AI becomes a sovereignty risk
  • EU AI Act
  • Sovereignty
December 14, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
Browsing Tag

recipient

1 post
1 min
  • Compliance and Legislation

Data Subject Access Request with identity of recipient

Every person has the right to know to whom his or her personal data have been disclosed. A…
January 14, 2023
Lees meer
Featured Posts
  • Global privacy alarm raised for AI without consent

    February 23, 2026
  • The future of legally binding digital signing in Europe

    February 18, 2026
  • When Palantir-AI becomes a sovereignty risk

    December 14, 2025
  • The Wallet that ends the weakest “password” link

    December 7, 2025
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (6)
  • EU AI Act (23)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025