{"id":1646,"date":"2021-07-26T11:20:49","date_gmt":"2021-07-26T09:20:49","guid":{"rendered":"https:\/\/87adsf68asd7f6.tatooine.link\/?p=1646"},"modified":"2025-03-24T15:53:58","modified_gmt":"2025-03-24T14:53:58","slug":"personal-data","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data","title":{"rendered":"Personal data"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3ozmny-aa5a0c92eed6fbdb7552d9d3a651862b\">\n.flex_column.av-3ozmny-aa5a0c92eed6fbdb7552d9d3a651862b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3ozmny-aa5a0c92eed6fbdb7552d9d3a651862b av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kr4mcn3f-77cd4734a48fb913a2f67de7940e3100'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>Personal data<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcboz1w3-4cfbe512506cf7971de9bef0b2091d68\">\n.avia-image-container.av-kcboz1w3-4cfbe512506cf7971de9bef0b2091d68 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kcboz1w3-4cfbe512506cf7971de9bef0b2091d68 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kcboz1w3-4cfbe512506cf7971de9bef0b2091d68 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14066 avia-img-lazy-loading-not-14066 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg\" alt='Two surveillance cameras collect personal data according to GDPR' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten-300x150.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kuh0jhxd-24c22938bf025a97a498eaf25de404de\">\n#top .hr.hr-invisible.av-kuh0jhxd-24c22938bf025a97a498eaf25de404de{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-kuh0jhxd-24c22938bf025a97a498eaf25de404de hr-invisible  avia-builder-el-3  el_after_av_image  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kugw71io-7e84dd580bb1bb9405db340543c2bbde\">\n#top .av-special-heading.av-kugw71io-7e84dd580bb1bb9405db340543c2bbde{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-kugw71io-7e84dd580bb1bb9405db340543c2bbde .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kugw71io-7e84dd580bb1bb9405db340543c2bbde .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-kugw71io-7e84dd580bb1bb9405db340543c2bbde .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-kugw71io-7e84dd580bb1bb9405db340543c2bbde av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-4  el_after_av_hr  el_before_av_textblock'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >Personal data<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-139b2-426ff1c86cd085856cdee3dce747242c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>According to the GDPR, personal data is all information relating to an identified or identifiable natural person. (<a href=\"https:\/\/www.robin-data.io\/en\/gdpr\/#Artikel%204\" rel=\" noopener\">Article 4(1) GDPR<\/a>)<\/p>\n<p>All information that can be assigned to a specific person or makes a person identifiable is personal data. Not only name, address or telephone number have personal reference, but under certain circumstances also already\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/pseudonymised-data\">pseudonymised data<\/a> such as a customer number or the IP address.<\/p>\n<\/div><\/section><\/p><\/div>\n<div class='flex_column_table av-kugzhyiz-4bff4471064941d01efb3b54886b431f sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kugzhyiz-4bff4471064941d01efb3b54886b431f\">\n.flex_column.av-kugzhyiz-4bff4471064941d01efb3b54886b431f{\nborder-radius:0px 0px 0px 0px;\npadding:25px 25px 25px 25px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  id=\"uebersicht\"  class='flex_column av-kugzhyiz-4bff4471064941d01efb3b54886b431f av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-top  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kugw85mz-4086ec0dd974507c58e2ebb902c7df8e\">\n#top .av-special-heading.av-kugw85mz-4086ec0dd974507c58e2ebb902c7df8e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-kugw85mz-4086ec0dd974507c58e2ebb902c7df8e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kugw85mz-4086ec0dd974507c58e2ebb902c7df8e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-kugw85mz-4086ec0dd974507c58e2ebb902c7df8e av-special-heading-h2 blockquote modern-quote  avia-builder-el-7  el_before_av_iconlist  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Content on the subject of personal data<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kugyym4c-c53209d426f8460835917493637c805c\">\n#top .avia-icon-list-container.av-kugyym4c-c53209d426f8460835917493637c805c .iconlist_icon{\ncolor:#127db3;\nfont-size:20px;\n}\n#top .avia-icon-list-container.av-kugyym4c-c53209d426f8460835917493637c805c .iconlist_icon svg:first-child{\nstroke:#127db3;\nfill:#127db3;\nheight:20px;\nwidth:20px;\n}\n#top #wrap_all .avia-icon-list-container.av-kugyym4c-c53209d426f8460835917493637c805c .av_iconlist_title{\nfont-size:20px;\n}\n<\/style>\n<div  class='avia-icon-list-container av-kugyym4c-c53209d426f8460835917493637c805c  avia-builder-el-8  el_after_av_heading  avia-builder-el-last'><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-small av-kugyym4c-c53209d426f8460835917493637c805c avia-iconlist-animate'>\n<li><div class='iconlist_icon av-kugyw6j7-2a945e122bc49f0f9bf887a67e573a79 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#personenbezogene-daten&#039; title=&#039;What is personal data?&#039;&gt;What is personal data?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#personenbezogene-daten' title='What is personal data?'>What is personal data?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li><a href=\"#beispiele\">BDSG, DSGVO and examples<\/a><\/li>\n<li><a href=\"#arten\">Types of personal data<\/a><\/li>\n<li><a href=\"#keine-personenbezogene-daten\">What does not fall under personal data?<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-kugyw6j7-2-5b3332e4d68cd3160135e2cb15a65342 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#schutz&#039; title=&#039;Personal data in the company and in practice&#039;&gt;Personal data in the company and in practice&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#schutz' title='Personal data in the company and in practice'>Personal data in the company and in practice<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li><a href=\"#schutz\">Why must personal data be protected? <\/a><\/li>\n<li><a href=\"#umgang\">Handling personal data<\/a><\/li>\n<li><a href=\"#weitergabe\">Disclosure of personal data<\/a><\/li>\n<li><a href=\"#ratgeber\">Specific guide on the misuse of personal data<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-kugyw6j7-1-23206d34830b74588b75f36b8a5d708e avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#rechte&#039; title=&#039;Important rights of the data subjects&#039;&gt;Important rights of the data subjects&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#rechte' title='Important rights of the data subjects'>Important rights of the data subjects<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li><a href=\"#selbstbestimmung\">Right to informational self-determination<\/a><\/li>\n<li><a href=\"#auskunftsrecht\">Right of access to the processing of personal data<\/a><\/li>\n<li><a href=\"#berichtigung\">Right to rectification, erasure and blocking of personal data<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-18era6-b594089cf5779af734e6b8589611a419\">\n.flex_column.av-18era6-b594089cf5779af734e6b8589611a419{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-18era6-b594089cf5779af734e6b8589611a419 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_half  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  id=\"personenbezogene-daten\"  class='av_textblock_section av-kugwb17c-2b1609cf7d3917f4103026b976cc2d05'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>What is personal data?<\/h2>\n<p>The term \"personal data\" includes any data that can be attributed to an identified or identifiable natural person.  Natural persons are considered to be identifiable if they can be identified directly or indirectly, for example by means of an allocation of identification numbers, etc.<\/p>\n<p>If such identification is theoretically possible, these data are considered personal data and must be processed accordingly.  An actual identification does not have to be carried out.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"beispiele\"  class='av_textblock_section av-kuh0dip1-a655b2e857d318a7e2ed2e0383cf0b07'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>BDSG, DSGVO and examples<\/h3>\n<p>The Federal Data Protection Act already dealt with this in <a href=\"https:\/\/help.robin-data.io\/paragraph-3-bdsg\">\u00a73<\/a> with personal data.<\/p>\n<p>Defined in the General Data Protection Regulation <a href=\"https:\/\/help.robin-data.io\/artikel-4-dsgvo\">Article 4 para. 1<\/a> personal data as information which, when attributed to a natural person, provides insight into that person's physical, physiological, genetic, mental, economic, cultural or social identity.<\/p>\n<p>Examples of personal data include names, telephone numbers and IP addresses, but also the appearance of a person and their working hours.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"arten\"  class='av_textblock_section av-kuh0dwi8-ba11814b42292641c974fdf714e602ec'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Types of personal data<\/h3>\n<p>Personal data can be divided into numerous types. These include, but are not limited to:<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-b11dge-7f9c820b74a0d0824b374ccb7350c478\">\n.flex_column.av-b11dge-7f9c820b74a0d0824b374ccb7350c478{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-b11dge-7f9c820b74a0d0824b374ccb7350c478 av_one_half  avia-builder-el-13  el_after_av_one_full  el_before_av_one_half  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-97e4am-3f44b713060553e08b41747939ec8049'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>Name<\/li>\n<li>Date of birth<\/li>\n<li>Age<\/li>\n<li>Marital status<\/li>\n<li>Address<\/li>\n<li>E-mail address<\/li>\n<li>IP addresses<\/li>\n<li>Phone number<\/li>\n<li>Account details<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2tlvda-022354d7543703df409e157bbc03bac8\">\n.flex_column.av-2tlvda-022354d7543703df409e157bbc03bac8{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2tlvda-022354d7543703df409e157bbc03bac8 av_one_half  avia-builder-el-15  el_after_av_one_half  el_before_av_one_full  flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-km4uwekg-ec4db2bf1b2dc82e93e415ae66c103e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>License plate<\/li>\n<li>Identity card number<\/li>\n<li>Social security number<\/li>\n<li>Location data<\/li>\n<li>Criminal record<\/li>\n<li>Health data<\/li>\n<li>Cultural \/ social characteristics<\/li>\n<li>Biometric data (e.g. fingerprint)<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-r99ce-9fb89b7e2763afe41ab4792399893c70\">\n.flex_column.av-r99ce-9fb89b7e2763afe41ab4792399893c70{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-r99ce-9fb89b7e2763afe41ab4792399893c70 av_one_full  avia-builder-el-17  el_after_av_one_half  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p><section  class='av_textblock_section av-kugwgw4h-b795a11f5e4b565aeb2da5103793e14b'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In addition, a distinction is made between special personal data with increased protection requirements. These data requiring special protection are divided into <a href=\"https:\/\/help.robin-data.io\/artikel-9-dsgvo\">Art. 9 para. 1 DSGVO<\/a> defined as: Data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership.<\/p>\n<p>The processing of genetic data, biometric data uniquely identifying a natural person, health data or data concerning a natural person's sex life or sexual orientation is also prohibited under the GDPR.<\/p>\n<p>The basic processing of personal data according to the GDPR is subject to special rules. If special categories of personal data are involved, the GDPR prohibits them, with the exception of the cases mentioned in Art. 9(2).<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-139b2-3-0b1ce313f00caf4ddc890901f57c5f1f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>It also includes information relating to the specific characteristics of a natural person, such as their physical, physiological, genetic, mental, economic, cultural or social identity, and even requires particularly sensitive handling of such information.<\/p>\n<p>If personal data is encrypted, this is referred to as <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/pseudonymised-data\">pseudonymised data<\/a>. These in turn differ from <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/anonymised-data\">anonymised data<\/a>.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"keine-personenbezogene-daten\"  class='av_textblock_section av-kugyg491-95db0168782c784328184994ff3600fa'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What does not fall under personal data?<\/h3>\n<p>Information on legal entities such as companies, associations and foundations are not protected by the GDPR and do not fall under personal data.<\/p>\n<p>Data that is completely anonymised and therefore does not allow any conclusions to be drawn about a person is also not considered personal data.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5d89ni-7dfff01ba482caf72a3c624b226295eb\">\n.flex_column.av-5d89ni-7dfff01ba482caf72a3c624b226295eb{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-5d89ni-7dfff01ba482caf72a3c624b226295eb av_one_full  avia-builder-el-21  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  id=\"praxis\"  class='av_textblock_section av-kugwsawp-11a0984c2292cd0babc48ced03e01fd8'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Personal data in the company and in practice<\/h2>\n<p>In addition to information that can be unambiguously linked to a person, such as a name or telephone number, there is also less clear information that must nevertheless be taken into account. For example, the question arose as to whether working hours fall under personal data. The European Court of Justice ruled on this:<\/p>\n<p><em>\"Records of working hours (...) which include the indication of the time at which a worker begins and ends his working day, as well as breaks or non-working time, fall within the notion of personal data (...)\".\u00a0<\/em><\/p>\n<p>If companies process personal data, the provisions of the GDPR must be complied with according to <a href=\"https:\/\/help.robin-data.io\/artikel-5-dsgvo\">Article 5 para. 1<\/a> to be observed. The principles for processing stated therein are:<\/p>\n<ul>\n<li>Lawfulness, processing in good faith, transparency<\/li>\n<li>Earmarking<\/li>\n<li>Data minimisation<\/li>\n<li>Correctness<\/li>\n<li>Memory limitation<\/li>\n<li>Integrity and confidentiality<\/li>\n<li>Accountability<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3jqde6-3675869c9ca19004c9be4e166f3e987e\">\n.flex_column.av-3jqde6-3675869c9ca19004c9be4e166f3e987e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3jqde6-3675869c9ca19004c9be4e166f3e987e av_one_full  avia-builder-el-23  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  id=\"schutz\"  class='av_textblock_section av-kugxw1n8-d998fb4e53b9d1fb67b6ba0e011cbb1d'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Why must personal data be protected?<\/h3>\n<p>Personal data according to the GDPR make it possible to identify natural persons and thus draw conclusions about their lifestyle. Based on this, targeted marketing and sales strategies, such as targeted advertisements, can be implemented, which are worth hard cash for companies.<br \/>\nBut this data is not only valuable for companies; criminals are also interested in accessing bank data, for example. To protect those affected, it is important to protect personal data from unauthorised access with increased care.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"umgang\"  class='av_textblock_section av-kugz68ge-f73480c6685dfadbfadac24bcd0ed275'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Handling personal data<\/h3>\n<p>Art. 5 GDPR regulates the processing of personal data for public and non-public bodies. Accordingly, lawfulness, fair processing, transparency, purpose limitation, data minimisation, accuracy, storage limitation, integrity and confidentiality, as well as accountability are crucial when dealing with these data. Lawfulness of processing is given if at least one condition of <a href=\"https:\/\/help.robin-data.io\/artikel-6-dsgvo\">Art. 6 DSGVO<\/a> is fulfilled.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"weitergabe\"  class='av_textblock_section av-kugz6ygy-53235801ce77743d650af4f8c0089ca0'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Disclosure of personal data<\/h3>\n<p>If personal data is disclosed, this represents a lasting encroachment on the rights of the data subjects. In order to avoid legal sanctions, it must be checked prior to disclosure whether the disclosure is lawful according to Article 6 of the GDPR. Otherwise, there is a risk of fines for the processing company as well as consequences for those affected by the disclosure.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kugxy3dr-efc5cfae48e68766176a80026700680f\">\n#top .av-special-heading.av-kugxy3dr-efc5cfae48e68766176a80026700680f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-kugxy3dr-efc5cfae48e68766176a80026700680f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kugxy3dr-efc5cfae48e68766176a80026700680f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"ratgeber\"  class='av-special-heading av-kugxy3dr-efc5cfae48e68766176a80026700680f av-special-heading-h3 blockquote modern-quote  avia-builder-el-27  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Specific guide on the misuse of personal data<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kugxyi93-ff86c85bf69ac0dda7b0240dc73cb4e8'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4>Address trading<\/h4>\n<p>Address trading is a component of direct marketing and represents the analogue form of individualist advertising. The aim of address trading, also known as list broking, is to expand the customer base through potential customers by means of advertising in the form of flyers, vouchers and the like. Companies turn specifically to address brokers, who provide not only private addresses but also company addresses. If a certain target group is aimed at, it is possible to include certain criteria in the creation of the address list. For example, only addresses from certain neighbourhoods and streets can be passed on. No consent is required from the persons concerned, so the trade in addresses and customer data is not illegal (<a href=\"https:\/\/help.robin-data.io\/paragraph-28-bdsg\">according to \u00a728 BDSG<\/a>). This concerns both the purchase and the sale.<\/p>\n<h4>Phishing<\/h4>\n<p>Phishing describes the fishing of access data and identities directly from the person concerned. In the process, victims are requested to enter access data on a website via a link in an email or also via SMS. This website was created specifically for phishing the data and often looks confusingly similar to the corresponding legitimate site. The data entered is then intercepted by the fraudsters and used for their own purposes. It is not uncommon for bank websites to be copied for this purpose. If bank data is actually entered, the fraudsters have the opportunity to transfer money or even steal the identity.<\/p>\n<p><strong>How can I recognise phishing emails?\u00a0<\/strong><\/p>\n<ul>\n<li>Watch out for spelling mistakes - texts are often translated mindlessly using translation programmes. This results in strange characters, unconverted umlauts, forgotten letters or even incorrect punctuation.<\/li>\n<li>A certain urgency is conveyed to those affected. The aim is to act quickly to avoid consequences such as the blocking of the account.<\/li>\n<li>The text may be in a foreign language. If you are not a customer of a foreign company, you should be sceptical.<\/li>\n<li>The lack of a direct personal form of address is also conspicuous. Fraudsters often resort to the formulation \"customer\" or \"user\".<\/li>\n<\/ul>\n<p><strong>How can you protect yourself from phishing?\u00a0<\/strong><\/p>\n<p>Many anti-virus programmes warn victims of the phishing website. The computer or browser can also warn of such a danger. It is important that all available security updates are installed. This applies to the computer as well as the anti-virus programme and the browser.<\/p>\n<p>A certain amount of scepticism also helps. If you do not know the website or if there are strange characters in the URL, you should not click on the link and certainly not enter any data.<\/p>\n<p>If the phishing is particularly disguised, it is also called pharming. When entering the URL in the browser, the victim is redirected to a fake website. A conspicuous feature is a request to enter new data and numbers in the URL.<\/p>\n<p>The following applies here: secure websites usually begin with \"https\" and have a small lock in front of the URL.<\/p>\n<h4>Data trading<\/h4>\n<p>Data trading is a lucrative business in which customer data is sold to companies. The seller makes a profit and the buyer has a list of potential new customers. In return, companies send out advertising material to expand their customer base. This approach is called direct marketing. The most widespread form is address trading.<\/p>\n<p>Often, such an intention to sell is announced in a privacy policy, which is usually accepted by data subjects without being read. This consent makes it legal to resell the data of the data subjects. An exception is special personal data such as health data. These may only be stored, used, processed or even passed on in very rare exceptional cases.<\/p>\n<h4>Identity theft<\/h4>\n<p>If third parties access personal data with the aim of misusing it, this is called identity theft. In this case, third parties can shop online under false names or even book money from a person's account to their own. The person concerned is still able to use his or her own identity.<\/p>\n<p><strong>How can it be determined whether the identity has been stolen?\u00a0<\/strong><\/p>\n<p>Clues that point to identity theft are:<\/p>\n<ul>\n<li>Login to a supposedly genuine website using password and email is not possible,<\/li>\n<li>Receiving payment requests or reminders for orders that have not been placed,<\/li>\n<li>Debit entries on the account by unknown companies,<\/li>\n<li>Or also claims from debt collection agencies for the settlement of outstanding sums<\/li>\n<\/ul>\n<p><strong>How should you react to identity theft?\u00a0<\/strong><\/p>\n<ul>\n<li>Report to the police, this is often a prerequisite for having accounts blocked.<\/li>\n<li>Contact the companies concerned and report your identity theft.<\/li>\n<li>To avoid negative entries, you should also inform Schufa.<\/li>\n<li>If you have not already done so, change all passwords.<\/li>\n<\/ul>\n<p><strong>What are the penalties for identity theft?\u00a0<\/strong><\/p>\n<p>Identity theft is not a specific offence in Germany. Consequently, there is no specific punishment, but fraudsters are liable to other criminal offences. For example, forgery of documents according to \u00a7267 StGB or false suspicion (\u00a7164 StGB), if crimes are committed online under another name. This has legal consequences for the perpetrators in the form of fines and imprisonment (up to 10 years). However, this only applies insofar as the perpetrators can be identified.<\/p>\n<p><strong>How can you protect yourself from identity theft?\u00a0<\/strong><\/p>\n<ul>\n<li>Use strong passwords - pay attention to criteria for strong passwords (length, characters used).<\/li>\n<li>Do not share your passwords, and it is not advisable to write passwords on loose leaf. Instead, use an online password manager.<\/li>\n<li>Activate two-factor authentication for important accounts. By leaving a mobile phone number, you will receive a confirmation message every time you log in to your account.<\/li>\n<li>Watch out for phishing emails and do not respond to them.<\/li>\n<li>Keep your computer up to date and perform the security updates.<\/li>\n<li>Anti-virus programmes also contribute to protection.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-211pha-d5cb84513f8b0411a18725fac24dac9c\">\n.flex_column.av-211pha-d5cb84513f8b0411a18725fac24dac9c{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-211pha-d5cb84513f8b0411a18725fac24dac9c av_one_full  avia-builder-el-29  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  id=\"rechte\"  class='av_textblock_section av-kugyfn68-6fdbabe80bd01982e21612670e35ae90'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Important rights of the data subjects<\/h2>\n<p>Data subjects whose data is collected, stored and processed have many rights. The three most important are the right to informational self-determination, the right to information and the right to correction, deletion and blocking of data.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"selbstbestimmung\"  class='av_textblock_section av-kugzccyk-7cec14cbcc93497756c1ffc100d7140e'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Right to informational self-determination<\/h3>\n<p>The right to informational self-determination falls under the right of personality and is thus protected by Article 1 of the Basic Law. It allows those affected to decide for themselves which data may be stored and processed. Active consent to the given purpose is necessary.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"auskunftsrecht\"  class='av_textblock_section av-kugzclei-a6bc7bb357a710c8cb6af70f1a4304fd'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Right of access to the processing of personal data<\/h3>\n<p><a href=\"https:\/\/help.robin-data.io\/paragraph-19-bdsg\">\u00a719<\/a> and the <a href=\"https:\/\/help.robin-data.io\/pargraph-44-bdsg\">\u00a734<\/a> BDSG give those affected the right to inspect their stored data at companies and authorities. Both public and non-public bodies are obliged to provide information.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"berichtigung\"  class='av_textblock_section av-kugzcxlh-5fa1d7df87f16ae43a9f9e0ec10a2ec9'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Right to rectification, erasure and blocking of personal data<\/h3>\n<p>If stored data is incorrect, outdated or has been stored or passed on unlawfully, there is a duty to block, correct or completely delete it in good time. Data subjects can demand these processes.<\/p>\n<p>In addition, those affected have the right to be forgotten. This provides that deleted data cannot be restored. This is regulated by <a href=\"https:\/\/help.robin-data.io\/artikel-17-dsgvo\">Art. 17 GDPR<\/a>.  Relevant deletion facts are therefore:<\/p>\n<ul>\n<li>The purpose of the data processing has ceased, which means that the data are no longer needed.<\/li>\n<li>The data subject\/data owner has revoked consent to data collection<\/li>\n<li>Data controller has objected to data processing<\/li>\n<li>Determination that personal data were unlawfully collected or processed in the first place<\/li>\n<li>Erasure process necessary in fulfilment of a legal obligation under EU law or on a national legal basis<\/li>\n<li>It concerns personal data of a child<\/li>\n<\/ul>\n<p>The article does not specify which technical measures are to be used to delete or destroy the data.<\/p>\n<p>As soon as a reason for cancellation is given, it must be carried out without delay. At the latest within one month of receipt of the request for cancellation, applicants must be informed of the appropriate measures for cancellation or of the reasons for refusal of the request.<\/p>\n<\/div><\/section><br \/>\n<section  id=\"loeschung\"  class='av_textblock_section av-kugygds1-b55a61ef0a0de2df607aa6659a9d341c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>How can I request the deletion of my data?<\/strong><\/p>\n<p>According to Art. 17 of the GDPR, every data subject has the right to have their data deleted. To do so, the company concerned must request the deletion of the data in writing or revoke the permission to process the data. In addition, a confirmation of the action can be requested. Within one month, the company must comply with the request. If the company refuses the request, a valid justification for the retention of the data must be provided (e.g. a legal obligation).<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-35  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-37  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data&#038;t=Personenbezogene%20Daten' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Personenbezogene%20Daten&#038;url=https:\/\/www.robin-data.io\/en\/?p=1646' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Personenbezogene%20Daten&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Personenbezogene%20Daten&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-38  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-40  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-41  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-16055 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/nis-2-directive' data-rel='slide-1' class='slide-image' title='NIS2: EU directive for more cyber security'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: NIS2: EU directive for more cyber security\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/nis-2-directive' title='NIS2: EU directive for more cyber security'>NIS2: EU directive for more cyber security<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >What does the NIS-2 Directive mean for organisations in Germany? Implementation obligations, sanctions, tips for implementation.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/nis-2-directive\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-13T17:46:49+01:00\" >13 November 2025<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/nis-2-directive#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-07-26T11:20:49+02:00\" >2025-11-13 17:46:49<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-03 14:21:10<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>NIS2: EU directive for more cyber security<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-17156 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms' data-rel='slide-1' class='slide-image' title='DSMS according to GDPR: Structure &amp; practical implementation'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"341\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1-495x341.jpg\" class=\"wp-image-14089 avia-img-lazy-loading-not-14089 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: DSMS according to GDPR: Structure &amp; practical implementation\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms' title='DSMS according to GDPR: Structure &amp; practical implementation'>DSMS according to GDPR: Structure &amp; practical implementation<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Learn all about templates, structure and implementation of a GDPR-compliant data protection management system (DMS).<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-23T09:41:39+02:00\" >23 April 2025<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>341<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-07-26T11:20:49+02:00\" >2025-04-23 09:41:39<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-23 09:44:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>DSMS according to GDPR: Structure &amp; practical implementation<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-17123 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden' data-rel='slide-1' class='slide-image' title='AI and data protection in practice'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2025\/01\/27132208\/kuenstliche-intelligenz-ai-495x343.png\" class=\"wp-image-16986 avia-img-lazy-loading-not-16986 attachment-portfolio size-portfolio wp-post-image\" alt=\"artificial intelligence\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: AI and data protection in practice\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden' title='AI and data protection in practice'>AI and data protection in practice<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Find out how artificial intelligence can be used in compliance with the GDPR. A practical guide.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-07T13:24:22+02:00\" >7 April 2025<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden#comments'>4 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2025\/01\/27132208\/kuenstliche-intelligenz-ai.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-07-26T11:20:49+02:00\" >2025-04-07 13:24:22<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-07 13:46:33<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>AI and data protection in practice<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>What are personal data in data protection? What must be observed when processing in accordance with GDPR?<\/p>","protected":false},"author":3,"featured_media":14066,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[37,122],"class_list":["post-1646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-datenschutz","tag-einfuehrung"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was sind personenbezogene Daten nach DSGVO? | Wiki<\/title>\n<meta name=\"description\" content=\"Was sind personenbezogene Daten im Datenschutz? Erfahren Sie im Beitrag was bei der Verarbeitung nach DSGVO zu beachten ist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Personenbezogene Daten\" \/>\n<meta property=\"og:description\" content=\"Was sind personenbezogene Daten im Datenschutz? Erfahren Sie im Beitrag was bei der Verarbeitung nach DSGVO zu beachten ist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-26T09:20:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T14:53:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Caroline Schwabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline Schwabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten\"},\"author\":{\"name\":\"Caroline Schwabe\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"headline\":\"Personenbezogene Daten\",\"datePublished\":\"2021-07-26T09:20:49+00:00\",\"dateModified\":\"2025-03-24T14:53:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten\"},\"wordCount\":4607,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg\",\"keywords\":[\"Datenschutz\",\"Einf\u00fchrung\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten\",\"name\":\"Was sind personenbezogene Daten nach DSGVO? | Wiki\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg\",\"datePublished\":\"2021-07-26T09:20:49+00:00\",\"dateModified\":\"2025-03-24T14:53:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"description\":\"Was sind personenbezogene Daten im Datenschutz? Erfahren Sie im Beitrag was bei der Verarbeitung nach DSGVO zu beachten ist.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Personenbezogene Daten\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\",\"name\":\"Caroline Schwabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"caption\":\"Caroline Schwabe\"},\"description\":\"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/csc\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is personal data according to the GDPR? | Wiki","description":"What is personal data in data protection? Find out in this article what needs to be taken into account when processing data in accordance with the GDPR.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data","og_locale":"en_GB","og_type":"article","og_title":"Personenbezogene Daten","og_description":"Was sind personenbezogene Daten im Datenschutz? Erfahren Sie im Beitrag was bei der Verarbeitung nach DSGVO zu beachten ist.","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2021-07-26T09:20:49+00:00","article_modified_time":"2025-03-24T14:53:58+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg","type":"image\/jpeg"}],"author":"Caroline Schwabe","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Caroline Schwabe","Estimated reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten"},"author":{"name":"Caroline Schwabe","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"headline":"Personenbezogene Daten","datePublished":"2021-07-26T09:20:49+00:00","dateModified":"2025-03-24T14:53:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten"},"wordCount":4607,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg","keywords":["Datenschutz","Einf\u00fchrung"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten","name":"What is personal data according to the GDPR? | Wiki","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg","datePublished":"2021-07-26T09:20:49+00:00","dateModified":"2025-03-24T14:53:58+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"description":"What is personal data in data protection? Find out in this article what needs to be taken into account when processing data in accordance with the GDPR.","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150327\/Personenbezogene-Daten.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/personenbezogene-daten#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Personenbezogene Daten"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5","name":"Caroline Schwabe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","caption":"Caroline Schwabe"},"description":"Ms. Schwabe is an information designer and Data Protection Officer. The focus of her work is to help customers and interested parties with contributions to the Robin Data Privacy Academy.","url":"https:\/\/www.robin-data.io\/en\/author\/csc"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=1646"}],"version-history":[{"count":26,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1646\/revisions"}],"predecessor-version":[{"id":10520,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1646\/revisions\/10520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14066"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=1646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=1646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=1646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}