{"id":1742,"date":"2019-10-15T08:16:13","date_gmt":"2019-10-15T06:16:13","guid":{"rendered":"https:\/\/87adsf68asd7f6.tatooine.link\/?p=1742"},"modified":"2025-03-24T13:36:43","modified_gmt":"2025-03-24T12:36:43","slug":"privacy-by-design","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design","title":{"rendered":"Privacy by Design"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7e2vb2-818f19f52cb57a216f28c426b8cffaf4\">\n.flex_column.av-7e2vb2-818f19f52cb57a216f28c426b8cffaf4{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-7e2vb2-818f19f52cb57a216f28c426b8cffaf4 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kr4ocgpt-4b683cb36955172d234e676788ae8e5e'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>Privacy by Design<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcbprwvn-116dc4ee866d8c04640c82dd98b655c4\">\n.avia-image-container.av-kcbprwvn-116dc4ee866d8c04640c82dd98b655c4 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kcbprwvn-116dc4ee866d8c04640c82dd98b655c4 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kcbprwvn-116dc4ee866d8c04640c82dd98b655c4 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_textblock'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14141 avia-img-lazy-loading-not-14141 avia_image' src=\"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg\" alt='A group of data protectionists help develop IT systems with the Privacy by Design approach' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg 685w, https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design-300x150.jpg 300w, https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-5m5cda-ac26bb4424384d8f7227d5da0b2b35e4'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span style=\"color: #303440;\">What is Privacy by Design?<\/span><\/h1>\n<h2>Thinking about data protection from the very beginning<\/h2>\n<p>Privacy by Design is the data protection compliant technical design and development of IT systems. The <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/general-data-protection-regulation-eu-gdpr\">GDPR<\/a> regulates this principle in\u00a0<a href=\"https:\/\/help.robin-data.io\/artikel-25-dsgvo?hsLang=de\" target=\"_blank\" rel=\"noopener\">Article 25<\/a>\u00a0and the\u00a0<a href=\"https:\/\/help.robin-data.io\/erwgr-78-dsgvo?hsLang=de\" target=\"_blank\" rel=\"noopener\">Recital 78<\/a>. It makes sense to examine possible data protection problems already in the development phase and to <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\">Data protection<\/a> to be included in the conception from the outset, instead of having to solve these problems afterwards in a tedious and time-consuming way. The Privacy by Design approach includes, among other things, the requirement of data economy, the separation of personal identifiers and content data, the use of the\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/pseudonymised-data\/?hsLang=de\" target=\"_blank\" rel=\"noopener\">pseudonymisation<\/a>\u00a0and the\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/anonymised-data\/?hsLang=de\" target=\"_blank\" rel=\"noopener\">anonymisation<\/a>\u00a0and the timely deletion of\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/pseudonymised-data\/?hsLang=de\" target=\"_blank\" rel=\"noopener\">personal data<\/a>.<\/p>\n<h2>What is the difference between Privacy by Design and Privacy by Default?<\/h2>\n<p>The three most important principles of Privacy by Design are firstly, transparency of data processing and the possibility of control by the data subject, secondly, the use of procedures that meet technical security standards, and thirdly, privacy by default. This serves to protect the users, especially if users have limited IT knowledge and are therefore not in a position to take the necessary technical measures themselves.<\/p>\n<p>An implementation example of Privacy by Default is the tracking settings of browsers. The browser automatically informs the visited websites that the user does not want or is not allowed to be tracked. The user can also switch off this protection and agree to tracking. This is called opt-in.<\/p>\n<h2>Consequences for data protection<\/h2>\n<p>The Privacy by Design approach should be as binding on technology manufacturers and developers as it is on those who are responsible for data processing and decide on the procurement and use of IT systems.<\/p>\n<p>Apps, for example, should be designed in such a way that, by default, they process only those data that are necessary for basic functionality. Other functions that require further data of the person concerned must first be activated by the user. Prior to this, the user must be informed in a few sentences about the benefits, the recipients authorised to access the data and the storage period of the data.<\/p>\n<p>The data subject should always be in control of his or her data and should be able to check which app function requires which data for which purpose and should be able to activate or deactivate individual functions. Observance of Privacy by Design also leads to an analysis of the future susceptibility of technologies to misuse. Therefore, the validity period of certificates should not be too long. Systems must be designed in such a way that security measures can be improved and added at a later date.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2e28u6-5b2b749297edb483c5fbf91687d84ff4\">\n.flex_column.av-2e28u6-5b2b749297edb483c5fbf91687d84ff4{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-2e28u6-5b2b749297edb483c5fbf91687d84ff4 av_one_full  avia-builder-el-4  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-ky8jml1u-a6e1457ce58982632991ac4ca1885bfa'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Data Protection Officer<\/strong><\/p>\n<p>You are welcome to contact us as\u00a0<strong>external data protection officer (DPO)\u00a0<\/strong>order. We also offer individual consulting services as well as audits and will be happy to provide you with a non-binding offer. You can find more information about our external data protection officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-ky8jmul2-5cefcfef1df0d1afe4a2f2953b40ac5f-wrap avia-button-left  avia-builder-el-6  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/data-protection-as-a-service'  class='avia-button av-ky8jmul2-5cefcfef1df0d1afe4a2f2953b40ac5f av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover DSB services\"><span class='avia_iconbox_title' >Discover DSB services<\/span><\/a><\/div><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3j083y-8dc05c8e9ef0332230a976b0c49ae68e\">\n.flex_column.av-3j083y-8dc05c8e9ef0332230a976b0c49ae68e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3j083y-8dc05c8e9ef0332230a976b0c49ae68e av_one_full  avia-builder-el-7  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-1vqqjy-606c19642adaaf242eb0cdfe1498b69c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Can data protection-friendly technology be a competitive advantage?<\/h2>\n<p>At first glance, Privacy by Design seems to inhibit the profitable use of personal data that many companies are striving for. However, the use of privacy enhancing technologies and information about them leads to a higher acceptance among those affected and to more legal certainty for companies. A win-win situation for both sides, so to speak. In contrast, non-transparent data processing without the participation of the data subject strengthens the public's distrust of the processing of their data. The pseudonymisation of data is particularly important in this context, as it only rarely contradicts an economically effective data analysis. Large online advertising networks have long recognized this.<\/p>\n<h3>Companies should not only rely on Privacy by Design for legal but also for economic reasons. If those affected are informed about the use of their data and can actively control it through data protection-friendly system design, acceptance of IT systems and services will increase. The active reference to the use of Privacy by Design can give companies an advantage.<\/h3>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-11  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design&#038;t=Privacy%20by%20Design' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Privacy%20by%20Design&#038;url=https:\/\/www.robin-data.io\/en\/?p=1742' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Privacy%20by%20Design&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Privacy%20by%20Design&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-12  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-14  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-15  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-11537 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law' data-rel='slide-1' class='slide-image' title='What is the TTDSG or TDDDG?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150307\/Betroffenenrechte-495x343.jpg\" class=\"wp-image-14053 avia-img-lazy-loading-not-14053 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What is the TTDSG or TDDDG?\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law' title='What is the TTDSG or TDDDG?'>What is the TTDSG or TDDDG?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The TTDSG became the Telecommunications Digital Services Data Protection Act (TDDDG) on 13 May 2024 as a result of the harmonisation with the EU Directive.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-08-02T13:46:38+02:00\" >2 August 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150307\/Betroffenenrechte.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-10-15T08:16:13+02:00\" >2021-08-02 13:46:38<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:19<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What is the TTDSG or TDDDG?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-11094 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers' data-rel='slide-1' class='slide-image' title='The new EU standard contract clauses'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender-495x343.jpg\" class=\"wp-image-14058 avia-img-lazy-loading-not-14058 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The new EU standard contractual clauses\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers' title='The new EU standard contract clauses'>The new EU standard contract clauses<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >On 07 June 2021, the European Commission published the new version of the EU Standard Contractual Clauses for the international transfer of personal data.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-06-10T13:26:03+02:00\" >10 June 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-10-15T08:16:13+02:00\" >2021-06-10 13:26:03<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:39:06<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The new EU standard contract clauses<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-9847 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' data-rel='slide-1' class='slide-image' title='Passwordless authentication via FIDO2'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Passwordless authentication via FIDO2\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' title='Passwordless authentication via FIDO2'>Passwordless authentication via FIDO2<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >What does passwordless authentication via FIDO2 mean? Why the password is obsolete and you should rely on the security standard!<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-04-26T15:00:36+02:00\" >26 April 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-10-15T08:16:13+02:00\" >2021-04-26 15:00:36<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:46:57<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Passwordless authentication via FIDO2<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>The technical conception and development of IT systems in conformity with data protection regulations has consequences for data protection and advantages for companies.<\/p>","protected":false},"author":1,"featured_media":14141,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[121],"class_list":["post-1742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-spezielle-themen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was ist Privacy by Design? | Wiki<\/title>\n<meta name=\"description\" content=\"Privacy by Design: Vorteile f\u00fcr Unternehmen mit datenschutzkonformer technischer Konzeption und Entwicklung von IT-Systemen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy by Design\" \/>\n<meta property=\"og:description\" content=\"Privacy by Design: Vorteile f\u00fcr Unternehmen mit datenschutzkonformer technischer Konzeption und Entwicklung von IT-Systemen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-15T06:16:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:36:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Prof. Dr. Andre D\u00f6ring\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prof. Dr. Andre D\u00f6ring\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design\"},\"author\":{\"name\":\"Prof. Dr. Andre D\u00f6ring\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/3663d4a72d1a1df6fdc38e0efdc4964b\"},\"headline\":\"Privacy by Design\",\"datePublished\":\"2019-10-15T06:16:13+00:00\",\"dateModified\":\"2025-03-24T12:36:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design\"},\"wordCount\":1842,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg\",\"keywords\":[\"Spezielle Themen\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design\",\"name\":\"Was ist Privacy by Design? | Wiki\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg\",\"datePublished\":\"2019-10-15T06:16:13+00:00\",\"dateModified\":\"2025-03-24T12:36:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/3663d4a72d1a1df6fdc38e0efdc4964b\"},\"description\":\"Privacy by Design: Vorteile f\u00fcr Unternehmen mit datenschutzkonformer technischer Konzeption und Entwicklung von IT-Systemen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy by Design\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/3663d4a72d1a1df6fdc38e0efdc4964b\",\"name\":\"Prof. Dr. Andre D\u00f6ring\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c215b0cbb4a4dc472be5e8c26330c3fcce3c39cc86b6f5cf1a009c8dc545fe26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c215b0cbb4a4dc472be5e8c26330c3fcce3c39cc86b6f5cf1a009c8dc545fe26?s=96&d=mm&r=g\",\"caption\":\"Prof. Dr. Andre D\u00f6ring\"},\"description\":\"Prof. Dr. Andre D\u00f6ring verf\u00fcgt \u00fcber umfangreiche Erfahrung als Datenschutzbeauftragter und Informationssicherheitsbeauftragter in diversen Branchen und bei Unternehmen sowie \u00f6ffentlichen Stellen unterschiedlicher Gr\u00f6\u00dfe.\",\"sameAs\":[\"https:\/\/87adsf68asd7f6.tatooine.link\"],\"url\":\"https:\/\/www.robin-data.io\/en\/author\/root\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Privacy by Design? | Wiki","description":"Privacy by Design: Advantages for companies with data protection-compliant technical design and development of IT systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design","og_locale":"en_GB","og_type":"article","og_title":"Privacy by Design","og_description":"Privacy by Design: Vorteile f\u00fcr Unternehmen mit datenschutzkonformer technischer Konzeption und Entwicklung von IT-Systemen.","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/privacy-by-design","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2019-10-15T06:16:13+00:00","article_modified_time":"2025-03-24T12:36:43+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg","type":"image\/jpeg"}],"author":"Prof. Dr. Andre D\u00f6ring","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Prof. Dr. Andre D\u00f6ring","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design"},"author":{"name":"Prof. Dr. Andre D\u00f6ring","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/3663d4a72d1a1df6fdc38e0efdc4964b"},"headline":"Privacy by Design","datePublished":"2019-10-15T06:16:13+00:00","dateModified":"2025-03-24T12:36:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design"},"wordCount":1842,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg","keywords":["Spezielle Themen"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design","name":"What is Privacy by Design? | Wiki","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg","datePublished":"2019-10-15T06:16:13+00:00","dateModified":"2025-03-24T12:36:43+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/3663d4a72d1a1df6fdc38e0efdc4964b"},"description":"Privacy by Design: Advantages for companies with data protection-compliant technical design and development of IT systems.","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#primaryimage","url":"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg","contentUrl":"https:\/\/media.robin-data.io\/2019\/10\/23161456\/Privacy-by-Design.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/privacy-by-design#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Privacy by Design"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/3663d4a72d1a1df6fdc38e0efdc4964b","name":"Prof. Dr. Andre D\u00f6ring","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c215b0cbb4a4dc472be5e8c26330c3fcce3c39cc86b6f5cf1a009c8dc545fe26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c215b0cbb4a4dc472be5e8c26330c3fcce3c39cc86b6f5cf1a009c8dc545fe26?s=96&d=mm&r=g","caption":"Prof. Dr. Andre D\u00f6ring"},"description":"Prof. Dr. Andre D\u00f6ring has extensive experience as a data protection officer and information security officer in various industries and with companies and public authorities of various sizes.","sameAs":["https:\/\/87adsf68asd7f6.tatooine.link"],"url":"https:\/\/www.robin-data.io\/en\/author\/root"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=1742"}],"version-history":[{"count":15,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1742\/revisions"}],"predecessor-version":[{"id":9378,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1742\/revisions\/9378"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14141"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=1742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=1742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=1742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}