{"id":1748,"date":"2019-11-11T14:00:14","date_gmt":"2019-11-11T13:00:14","guid":{"rendered":"https:\/\/87adsf68asd7f6.tatooine.link\/?p=1748"},"modified":"2025-03-24T13:37:32","modified_gmt":"2025-03-24T12:37:32","slug":"eprivacy-regulation","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation","title":{"rendered":"The ePrivacy Regulation"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7xqdzo-f137b1ee1d30218c65e216851f164ab6\">\n.flex_column.av-7xqdzo-f137b1ee1d30218c65e216851f164ab6{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-7xqdzo-f137b1ee1d30218c65e216851f164ab6 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kr4o7lsp-77e1d33976f8d2d601c2aae836cd882e'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>The ePrivacy Regulation<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcbplvem-52c0a1d9f9912caab5959cde253c964c\">\n.avia-image-container.av-kcbplvem-52c0a1d9f9912caab5959cde253c964c img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kcbplvem-52c0a1d9f9912caab5959cde253c964c .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kcbplvem-52c0a1d9f9912caab5959cde253c964c av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_textblock'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14060 avia-img-lazy-loading-not-14060 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg\" alt='A woman&#039;s face is hidden behind biometric recognition patterns. E-privacy regulation aims to protect personal data.' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy-300x150.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-6dq544-be265bfb6d0f0bc764761d2ad61cab2d'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span style=\"color: #303440;\">The ePrivacy Regulation<\/span><\/h1>\n<h2>What is the ePrivacy Regulation?<\/h2>\n<p>The EU's e-Privacy Regulation aims to <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data\">individual-related data<\/a> in electronic communications. It will replace the e-Privacy Directive of 2002, which the German legislator has largely implemented in the Telemedia Act and the Telecommunications Act. The Regulation, on the other hand, will be directly applicable. Due to technical and economic developments since 2002, the new regulation has become necessary.<\/p>\n<p>Originally, the ePrivacy Regulation, together with the\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/general-data-protection-regulation-eu-gdpr\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation (GDPR)<\/a>\u00a0come into force. The EU Commission had already prepared a first draft in 2017. But due to fierce resistance from the business community, the EU had to suspend its adoption. Many companies fear that the regulation will damage their digital business.<\/p>\n<p>The reform has now been on hold for two years because the member states cannot reach agreement. The advocates of an effective <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\">data protection<\/a> in communication is opposed by a powerful interest group consisting of publishers, US-led advertising networks and Internet companies.<\/p>\n<p>This results from their interaction in data marketing: European publishing houses supply the connection data of their online readers to global advertising networks. They generate user profiles from the huge amounts of data, which are constantly enriched with new detailed data on the characteristics, behaviour and buying habits of the respective person. In addition to the major players with their own platforms such as Google, Facebook and Amazon, there are European Internet groups such as Spotify and Zalando as well as service providers. This group is very much interested in the fact that the user must make as few clicks as possible for his or her consent in order to be able to process and market as much personal data as possible.<\/p>\n<h2>For whom is the ePrivacy Regulation important?<\/h2>\n<p>The regulation will probably affect every website operator, especially if they use cookies, tracking and profiling. In the future, consent to the use of cookies could be required for advertising analysis and tracking, but not for reach measurement and contract fulfilment. So far, under German law, the opt-out is sufficient.<\/p>\n<p>Business models based on the 5G network, such as autonomous driving, would be prevented if the user did not agree to it. This also applies to indoor tracking in department stores. Currently, pseudonymous tracking is allowed there, but in future consent would have to be obtained.<\/p>\n<p>Therefore, consent to data processing and data protection-friendly basic settings of apps and browsers are at the core of the planned regulation. The mandatory consent of the user to each new type of processing of his personal data is also a core of the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/general-data-protection-regulation-eu-gdpr\">GDPR<\/a>.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-21aa78-c78df8e51e151258abd93db20e8e0409\">\n.flex_column.av-21aa78-c78df8e51e151258abd93db20e8e0409{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-21aa78-c78df8e51e151258abd93db20e8e0409 av_one_full  avia-builder-el-4  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-ky8iq98m-0ea04eb51e2c3a9943d15fd215ff923a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Data Protection Officer<\/strong><\/p>\n<p>You are welcome to contact us as\u00a0<strong>external data protection officer (DPO)\u00a0<\/strong>order. We also offer individual consulting services as well as audits and will be happy to provide you with a non-binding offer. You can find more information about our external data protection officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-ky8iqham-4ec603c2ca68f3e3dc31adc5ce67a6ee-wrap avia-button-left  avia-builder-el-6  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/data-protection-as-a-service'  class='avia-button av-ky8iqham-4ec603c2ca68f3e3dc31adc5ce67a6ee av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover DSB services\"><span class='avia_iconbox_title' >Discover DSB services<\/span><\/a><\/div><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4kzgsk-5ddf1bef7138a8891cbcc3c083bdaa83\">\n.flex_column.av-4kzgsk-5ddf1bef7138a8891cbcc3c083bdaa83{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-4kzgsk-5ddf1bef7138a8891cbcc3c083bdaa83 av_one_full  avia-builder-el-7  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-a6z84-aaf61eff8e0cead1597a71d79d698d1c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>What are the contentious issues in the EU negotiations?<\/h2>\n<p>Particularly controversial is the possibility of secure,\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/pseudonymised-data\/?hsLang=de\" target=\"_blank\" rel=\"noopener\">pseudonymised<\/a>\u00a0Further processing of metadata debated. The most important sticking point in the negotiations is the further processing of telecommunications connection data. If the consent of the user or the\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/anonymised-data\/?hsLang=de\" target=\"_blank\" rel=\"noopener\">anonymisation<\/a>\u00a0are necessary, this will bring down various business models. The cookie solution, on the other hand, is not in dispute at present, according to which the service can be provided without consent, but tracking requires consent.<\/p>\n<p>The EU Council of Ministers is still divided on important points. Agreement is needed before the trialogue negotiations with Parliament and the Commission can begin. An agreement is unlikely to be reached before 2020. A two-year transition period may be agreed at that time. In November, the Finnish EU Presidency intends to present the next compromise proposal.<\/p>\n<p style=\"font-size: 24px;\"><strong>Companies can already prepare for the planned e-Privacy Regulation by clarifying how they work with service providers on cookies and tracking and how these procedures are used.<\/strong><\/p>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-11  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation&#038;t=Die%20e-Privacy-Verordnung' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Die%20e-Privacy-Verordnung&#038;url=https:\/\/www.robin-data.io\/en\/?p=1748' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Die%20e-Privacy-Verordnung&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Die%20e-Privacy-Verordnung&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-12  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-14  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-15  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-11094 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers' data-rel='slide-1' class='slide-image' title='The new EU standard contract clauses'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender-495x343.jpg\" class=\"wp-image-14058 avia-img-lazy-loading-not-14058 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The new EU standard contractual clauses\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers' title='The new EU standard contract clauses'>The new EU standard contract clauses<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >On 07 June 2021, the European Commission published the new version of the EU Standard Contractual Clauses for the international transfer of personal data.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-06-10T13:26:03+02:00\" >10 June 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-11-11T14:00:14+01:00\" >2021-06-10 13:26:03<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:39:06<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The new EU standard contract clauses<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-9847 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' data-rel='slide-1' class='slide-image' title='Passwordless authentication via FIDO2'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Passwordless authentication via FIDO2\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' title='Passwordless authentication via FIDO2'>Passwordless authentication via FIDO2<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >What does passwordless authentication via FIDO2 mean? Why the password is obsolete and you should rely on the security standard!<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-04-26T15:00:36+02:00\" >26 April 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-11-11T14:00:14+01:00\" >2021-04-26 15:00:36<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:46:57<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Passwordless authentication via FIDO2<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-1720 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet' data-rel='slide-1' class='slide-image' title='Data protection of children on the Internet'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder-495x343.jpg\" class=\"wp-image-14064 avia-img-lazy-loading-not-14064 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data protection for children on the internet\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet' title='Data protection of children on the Internet'>Data protection of children on the Internet<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Information by parents and concrete rules on media use are useful. How can the use of digital media be taught?<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2020-01-21T10:20:39+01:00\" >21 January 2020<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Ulrich Hottelet<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Ulrich Hottelet<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-11-11T14:00:14+01:00\" >2020-01-21 10:20:39<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:37:45<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data protection of children on the Internet<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>The e-Privacy Regulation is controversial. Economic interests are opposed to data protection. Learn how your company has to prepare.<\/p>","protected":false},"author":9,"featured_media":14060,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[121],"class_list":["post-1748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-spezielle-themen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was ist die e-Privacy-Verordnung? | Wiki<\/title>\n<meta name=\"description\" content=\"Umstrittene e-Privacy-Verordnung ersetzt e-Privacy-Richtlinie von 2002. Wirtschaftliche Interessen stehen dem Datenschutz gegen\u00fcber.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die e-Privacy-Verordnung\" \/>\n<meta property=\"og:description\" content=\"Umstrittene e-Privacy-Verordnung ersetzt e-Privacy-Richtlinie von 2002. Wirtschaftliche Interessen stehen dem Datenschutz gegen\u00fcber.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-11T13:00:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:37:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ulrich Hottelet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ulrich Hottelet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung\"},\"author\":{\"name\":\"Ulrich Hottelet\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"headline\":\"Die e-Privacy-Verordnung\",\"datePublished\":\"2019-11-11T13:00:14+00:00\",\"dateModified\":\"2025-03-24T12:37:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung\"},\"wordCount\":1802,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg\",\"keywords\":[\"Spezielle Themen\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung\",\"name\":\"Was ist die e-Privacy-Verordnung? | Wiki\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg\",\"datePublished\":\"2019-11-11T13:00:14+00:00\",\"dateModified\":\"2025-03-24T12:37:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"description\":\"Umstrittene e-Privacy-Verordnung ersetzt e-Privacy-Richtlinie von 2002. Wirtschaftliche Interessen stehen dem Datenschutz gegen\u00fcber.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die e-Privacy-Verordnung\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\",\"name\":\"Ulrich Hottelet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"caption\":\"Ulrich Hottelet\"},\"description\":\"Freier IT-Journalist mit den Schwerpunkten Datenschutz, IT-Sicherheit und K\u00fcnstliche Intelligenz.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/support\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is the e-Privacy Regulation? | Wiki","description":"Controversial e-Privacy Regulation replaces e-Privacy Directive of 2002. Economic interests oppose data protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation","og_locale":"en_GB","og_type":"article","og_title":"Die e-Privacy-Verordnung","og_description":"Umstrittene e-Privacy-Verordnung ersetzt e-Privacy-Richtlinie von 2002. Wirtschaftliche Interessen stehen dem Datenschutz gegen\u00fcber.","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eprivacy-regulation","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2019-11-11T13:00:14+00:00","article_modified_time":"2025-03-24T12:37:32+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg","type":"image\/jpeg"}],"author":"Ulrich Hottelet","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Ulrich Hottelet","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung"},"author":{"name":"Ulrich Hottelet","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"headline":"Die e-Privacy-Verordnung","datePublished":"2019-11-11T13:00:14+00:00","dateModified":"2025-03-24T12:37:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung"},"wordCount":1802,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg","keywords":["Spezielle Themen"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung","name":"What is the e-Privacy Regulation? | Wiki","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg","datePublished":"2019-11-11T13:00:14+00:00","dateModified":"2025-03-24T12:37:32+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"description":"Controversial e-Privacy Regulation replaces e-Privacy Directive of 2002. Economic interests oppose data protection.","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150317\/EPrivacy.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/e-privacy-verordnung#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Die e-Privacy-Verordnung"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515","name":"Ulrich Hottelet","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","caption":"Ulrich Hottelet"},"description":"Freelance IT journalist specialising in data protection, IT security and artificial intelligence.","url":"https:\/\/www.robin-data.io\/en\/author\/support"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=1748"}],"version-history":[{"count":14,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1748\/revisions"}],"predecessor-version":[{"id":9408,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1748\/revisions\/9408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14060"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=1748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=1748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=1748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}