{"id":8490,"date":"2021-03-03T13:36:27","date_gmt":"2021-03-03T12:36:27","guid":{"rendered":"https:\/\/www.robin-data.io\/?p=8490"},"modified":"2025-03-24T16:18:16","modified_gmt":"2025-03-24T15:18:16","slug":"data-protection-basics","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics","title":{"rendered":"Data protection"},"content":{"rendered":"<div  class='flex_column av-3nreq2-16c09fe6c4f0fbb55afe17dbc1f3db30 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div'     ><p><section  class='av_textblock_section av-kr4mlknn-f069f91bd39cbbae0cb66abda631ad28'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>Data protection basics<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kltfa57p-3b82dc53121556d73bb5927158ffe402\">\n.avia-image-container.av-kltfa57p-3b82dc53121556d73bb5927158ffe402 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kltfa57p-3b82dc53121556d73bb5927158ffe402 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kltfa57p-3b82dc53121556d73bb5927158ffe402 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14061 avia-img-lazy-loading-not-14061 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg\" alt='Data is hidden behind the symbol of a lock. Data protection basics and definition' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield-300x150.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kltfaybs-1e8cc4bcf34c42c1d1aa7297d531ae61\">\n#top .hr.hr-invisible.av-kltfaybs-1e8cc4bcf34c42c1d1aa7297d531ae61{\nheight:15px;\n}\n<\/style>\n<div  class='hr av-kltfaybs-1e8cc4bcf34c42c1d1aa7297d531ae61 hr-invisible  avia-builder-el-3  el_after_av_image  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjd7r4-c79926d152e6d851601cdff9e3d023b8\">\n#top .av-special-heading.av-lfjjd7r4-c79926d152e6d851601cdff9e3d023b8{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-lfjjd7r4-c79926d152e6d851601cdff9e3d023b8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjd7r4-c79926d152e6d851601cdff9e3d023b8 .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-lfjjd7r4-c79926d152e6d851601cdff9e3d023b8 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lfjjd7r4-c79926d152e6d851601cdff9e3d023b8 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-4  el_after_av_hr  el_before_av_textblock'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >Data protection basics according to GDPR<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjdp7v-0906eb2e10772744cbbc36597d68344f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In addition to numerous conveniences, advancing digitalisation also brings considerable challenges for authorities, organisations and companies. Whereas personal data used to be kept primarily in local registers, it can now be disseminated globally and in the shortest possible time thanks to the internet. Many people do not realise the extent of the information about them that is already circulating online. From online purchases and bank details to personal preferences, detailed profiles can be created. The often careless handling of this data emphasises the growing need for data protection.<\/p>\n<p>If sensitive information falls into unauthorised hands, it can cause considerable damage. Data protection has the task of preventing this. In Germany and many other European countries, the General Data Protection Regulation (GDPR) regulates the right of every citizen to determine how their personal data is used.<\/p>\n<\/div><\/section><\/p><\/div>\n<div class='flex_column_table av-lw9umk-33703d3362028b1aa2ff3515470fd277 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lw9umk-33703d3362028b1aa2ff3515470fd277\">\n.flex_column.av-lw9umk-33703d3362028b1aa2ff3515470fd277{\nborder-radius:0px 0px 0px 0px;\npadding:25px 25px 25px 25px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  id=\"uebersicht\"  class='flex_column av-lw9umk-33703d3362028b1aa2ff3515470fd277 av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-top  column-top-margin'     ><section  class='av_textblock_section av-kiipug5e-9fb40f37d4a3507a9adb6100183fdb62'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Content on the topic of data protection basics according to GDPR:<\/h2>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8\">\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon{\ncolor:#127db3;\nfont-size:20px;\n}\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon svg:first-child{\nstroke:#127db3;\nfill:#127db3;\nheight:20px;\nwidth:20px;\n}\n#top #wrap_all .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .av_iconlist_title{\nfont-size:20px;\n}\n<\/style>\n<div  class='avia-icon-list-container av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8  avia-builder-el-8  el_after_av_textblock  el_before_av_hr'><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-small av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 avia-iconlist-animate'>\n<li><div class='iconlist_icon av-1m936j-55aac0e508395f1fa6bc295df9c3314f avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#datenschutz-definition&#039; title=&#039;Definition: What is data protection?&#039;&gt;Definition: What is data protection?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#datenschutz-definition' title='Definition: What is data protection?'>Definition: What is data protection?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li style=\"font-size: 20px;\"><a href=\"#datenschutzgesetze\">What are the data protection laws?<\/a><\/li>\n<li style=\"font-size: 20px;\"><a href=\"#datenschutz-fuer-unternehmen\">What does data protection mean for companies?<\/a><\/li>\n<li style=\"font-size: 20px;\"><a href=\"#branchenspezifische-unterschiede\">Are there industry-specific differences in data protection?<\/a><\/li>\n<li style=\"font-size: 20px;\"><a href=\"#warum-datenschutz-wichtig-ist\">Why is data protection so important?<\/a><\/li>\n<li style=\"font-size: 20px;\"><a href=\"#datenschutz-verbraucher\">How do consumers benefit from data protection?<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-cqanyz-0373db8b94134ebb6a994be01d23552c avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#kontrollen-und-ueberpruefung&#039; title=&#039;Regular checks and inspections&#039;&gt;Regular checks and inspections&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#kontrollen-und-ueberpruefung' title='Regular checks and inspections'>Regular checks and inspections<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li style=\"font-size: 20px;\"><a href=\"#kosten-datenschutz-verstoss\">What is the cost of a data breach?<\/a><\/li>\n<li style=\"font-size: 20px;\"><a href=\"#datenschutz-haftung\">Who is liable for breaches of the Data Protection Act?<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-cqanyz-3-5a54da0b341c907924e737505fb90d26 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#video&#039; title=&#039;Video: Implementing a data protection management system with Robin Data ComplianceOS&reg;&#039;&gt;Video: Implementing a data protection management system with Robin Data ComplianceOS&reg;&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#video' title='Video: Implementing a data protection management system with Robin Data ComplianceOS\u00ae'>Video: Implementing a data protection management system with Robin Data ComplianceOS\u00ae<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-cqanyz-3-2-6779cf90b15fb32307e7ccb003b05c1c avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#unterschied-datenschutz-datensicherheit&#039; title=&#039;What is the difference between data protection and data security?&#039;&gt;What is the difference between data protection and data security?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#unterschied-datenschutz-datensicherheit' title='What is the difference between data protection and data security?'>What is the difference between data protection and data security?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa\">\n#top .hr.hr-invisible.av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa hr-invisible  avia-builder-el-9  el_after_av_iconlist  avia-builder-el-last'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<div  class='flex_column av-300n4a-ae32466bfe587e773a861a8b563e3441 av_one_full  avia-builder-el-10  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjorf7-2302f2e0858da9e574fa91bbd5636dec\">\n#top .av-special-heading.av-lfjjorf7-2302f2e0858da9e574fa91bbd5636dec{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjjorf7-2302f2e0858da9e574fa91bbd5636dec .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjorf7-2302f2e0858da9e574fa91bbd5636dec .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"datenschutz-definition\"  class='av-special-heading av-lfjjorf7-2302f2e0858da9e574fa91bbd5636dec av-special-heading-h2 blockquote modern-quote  avia-builder-el-11  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Definition: What is data protection?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjqpq1-c12eab1e81297dd619061c80f809b7cf'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Through the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/general-data-protection-regulation-eu-gdpr\">General Data Protection Regulation<\/a>which came into force on 25 May 2018, aims to safeguard the fundamental right to informational self-determination. This means that individuals themselves determine how their data is handled and who may receive what information. Based on the right to informational self-determination, the GDPR regulates the collection, use, storage and disclosure of personal data.<\/p>\n<p>Data protection protects individuals from abusive data processing and guarantees privacy. Without a legal basis or consent, the processing <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data\">personal data<\/a> prohibited. Only necessary data should be collected with the knowledge of the data subject, processed for a specific purpose and deleted when the purpose no longer applies. Technical measures against misuse are mandatory. Data subjects have rights of access, objection, rectification and erasure. Data protection in Germany is primarily governed by the GDPR and <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law-2\">BDSG.<\/a> which, among other things, stipulate lawfulness, purpose limitation, data minimisation and accuracy. Data protection prevents unauthorised data collection, processing and disclosure in order to prevent identity theft and safeguard the right to informational self-determination.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjrmcl-8b8bbdc1aa0e4a5c7f2b1c08ff06b1a8\">\n#top .av-special-heading.av-lfjjrmcl-8b8bbdc1aa0e4a5c7f2b1c08ff06b1a8{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjjrmcl-8b8bbdc1aa0e4a5c7f2b1c08ff06b1a8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjrmcl-8b8bbdc1aa0e4a5c7f2b1c08ff06b1a8 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"datenschutzgesetze\"  class='av-special-heading av-lfjjrmcl-8b8bbdc1aa0e4a5c7f2b1c08ff06b1a8 av-special-heading-h3 blockquote modern-quote  avia-builder-el-13  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >What are the data protection laws?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjs1a0-05e78ef9327c0361840df36bcb727701'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The Federal Data Protection Act (short <a href=\"https:\/\/help.robin-data.io\/bdsg\" target=\"_blank\" rel=\"noopener\">BDSG.<\/a>) is a central data protection law in Germany, which regulates data protection at national level when the <a href=\"https:\/\/help.robin-data.io\/dsgvo\" target=\"_blank\" rel=\"noopener\">GDPR<\/a> grants a certain leeway in the implementation of data protection through opening clauses. It serves to supplement and concretise the GDPR and only intervenes with its specific provisions if the GDPR cannot be applied.<\/p>\n<p>The Telemedia Act (TMG for short) is a central law in the field of internet law and the most important legal provision since the Telemedia Service and the Interstate Treaty on Media Services ceased to be in force. It contains regulations and obligations for providers of telemedia. This includes electronic information and communication services that are not subject to the Interstate Broadcasting Treaty or the Telecommunications Act. In general, the regulations apply to private, public or commercial providers of telemedia. One example of the obligations written into the TMG is the obligation to provide an imprint.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjpnq9-282013e320a0e587a8243c02b5a48e87\">\n#top .av-special-heading.av-lfjjpnq9-282013e320a0e587a8243c02b5a48e87{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjjpnq9-282013e320a0e587a8243c02b5a48e87 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjpnq9-282013e320a0e587a8243c02b5a48e87 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"datenschutz-fuer-unternehmen\"  class='av-special-heading av-lfjjpnq9-282013e320a0e587a8243c02b5a48e87 av-special-heading-h3 blockquote modern-quote  avia-builder-el-15  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >What does data protection mean for companies?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m8n6dn8w-b02c45f5d02c31ba138aeea89d695827'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p data-sourcepos=\"1:1-1:103\">Companies must observe data protection principles to ensure GDPR compliance. This includes:<\/p>\n<ul data-sourcepos=\"3:1-9:698\">\n<li data-sourcepos=\"3:1-3:380\"><strong>Data Protection Officer:<\/strong> The appointment of an internal or external <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-officer-gdpr\">Data Protection Officer<\/a> is mandatory in certain cases and serves the secure and efficient implementation of data protection requirements in the company.<\/li>\n<li data-sourcepos=\"4:1-4:737\"><strong>Processing activities:<\/strong> The detailed management of a <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/directory-of-processing-activities-2\" target=\"_blank\" rel=\"noopener\">List of processing activities<\/a> is essential. This directory must clearly define responsibilities, the type of data processed and the respective deletion periods in order to ensure transparency towards data subjects and supervisory authorities.<\/li>\n<li data-sourcepos=\"5:1-5:599\"><strong>Privacy policy:<\/strong> Every data subject has the right to be informed about the processing of their data. Therefore, companies must provide an easily accessible and understandable privacy policy, especially website operators on their site. This right is based on the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/right-to-informational-self-determination\" target=\"_blank\" rel=\"noopener\">Right to informational self-determination<\/a>which is strengthened by the General Data Protection Regulation (EU GDPR).<\/li>\n<li data-sourcepos=\"6:1-6:374\"><strong>Data protection secrecy:<\/strong> All persons who come into contact with personal data in the company must be obliged in writing to maintain data protection secrecy and the confidentiality of company-related data. The <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/controller\" target=\"_blank\" rel=\"noopener\">controller<\/a> in the company ensures this.<\/li>\n<li data-sourcepos=\"7:1-7:546\"><strong>Order processing contract (AVV):<\/strong> If external service providers process personal data on behalf of the controller, the conclusion of a legally compliant data processing agreement is mandatory. <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/gdpr-compliant-data-processing-agreement\" target=\"_blank\" rel=\"noopener\">Data processing agreement (DPA)<\/a> This is necessary in order to clearly regulate the rights and obligations of both parties and to guarantee the security of the data. HeyData offers support in this regard.<\/li>\n<li data-sourcepos=\"8:1-8:679\"><strong>Data protection measures:<\/strong> The implementation of suitable <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/technical-organisational-measures-gdpr-compliant-implementation\" target=\"_blank\" rel=\"noopener\">technical and organisational measures (TOM)<\/a> is crucial to ensure the security of data in accordance with the requirements of the GDPR. This requires the development of a comprehensive company concept that includes, for example, secure access codes, user accounts and clear operational workflows.<\/li>\n<li data-sourcepos=\"9:1-9:430\"><strong>Data protection impact assessment (DPIA):<\/strong> In the case of processing operations likely to result in a high risk to the rights and freedoms of natural persons, it is necessary to carry out a risk assessment. <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-impact-assessment-2\" target=\"_blank\" rel=\"noopener\">data protection impact assessment<\/a> in accordance with Art. 35 GDPR in order to assess these risks and define measures to minimise them.<\/li>\n<li data-sourcepos=\"10:1-10:359\"><strong>Deletion concept:<\/strong> Companies must have a <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/erasure-concept-gdpr\" target=\"_blank\" rel=\"noopener\">Erasure concept<\/a> develop and implement a system that specifies when and how personal data is to be deleted or anonymised as soon as the purpose of the processing no longer applies and there are no longer any statutory retention obligations.<\/li>\n<li data-sourcepos=\"9:1-9:698\"><strong>Sensitisation of the workforce:<\/strong> Data protection can only work if it is practised by all employees. Regular training and awareness-raising measures by the internal or external data protection officer are essential to raise awareness of the protection of personal data and promote compliance with data protection principles. In addition, processes for dealing with <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-breaches\" target=\"_blank\" rel=\"noopener\">Data Protection Breaches<\/a> be established.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yp6x6-270f382d6d7d62e07c76f849092b6701\">\n#top .av-special-heading.av-1yp6x6-270f382d6d7d62e07c76f849092b6701{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1yp6x6-270f382d6d7d62e07c76f849092b6701 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1yp6x6-270f382d6d7d62e07c76f849092b6701 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"branchenspezifische-unterschiede\"  class='av-special-heading av-1yp6x6-270f382d6d7d62e07c76f849092b6701 av-special-heading-h3 blockquote modern-quote  avia-builder-el-17  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Are there industry-specific differences in data protection?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjt9wf-050d3486cdddb3ffc667b0d36e66e26d'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p class=\"translation-block\">At the latest since the introduction of the GDPR, there has been a uniform regulation on <strong>data protection<\/strong>. Anyone who works with personal data within the European Union will find regulations and obligations in the GDPR that must be followed. In addition, there may be special legal bases for certain industries that must be observed. Likewise, the GDPR applies to sellers from non-EU countries (so-called third countries) as soon as the customer is from the European Union.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjup5b-ae3b3d68a87be421b3c4222b58cb507a\">\n#top .av-special-heading.av-lfjjup5b-ae3b3d68a87be421b3c4222b58cb507a{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjjup5b-ae3b3d68a87be421b3c4222b58cb507a .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjup5b-ae3b3d68a87be421b3c4222b58cb507a .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"warum-datenschutz-wichtig-ist\"  class='av-special-heading av-lfjjup5b-ae3b3d68a87be421b3c4222b58cb507a av-special-heading-h3 blockquote modern-quote  avia-builder-el-19  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >What is the point of data protection or why is data protection so important?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjuze5-ee2906f1a112486f8f5fce8542ed4118'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Technological advances bring with them not only unimagined opportunities, but also many unimagined dangers. For example, websites collect data from users without their necessarily knowing it. This data can be very valuable for personal or economic reasons.<\/p>\n<p>The processing of data on the Internet carries the risk of unauthorised persons gaining access to it. To protect customers from data misuse, but also to protect your company from attackers and fines, you should ensure that personal data is processed in compliance with the GDPR and is optimally protected.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjvn3s-6fe4531edaa1adbb8a319610afd2fd9e\">\n#top .av-special-heading.av-lfjjvn3s-6fe4531edaa1adbb8a319610afd2fd9e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjjvn3s-6fe4531edaa1adbb8a319610afd2fd9e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjvn3s-6fe4531edaa1adbb8a319610afd2fd9e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"datenschutz-verbraucher\"  class='av-special-heading av-lfjjvn3s-6fe4531edaa1adbb8a319610afd2fd9e av-special-heading-h3 blockquote modern-quote  avia-builder-el-21  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >How do consumers benefit from data protection?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjvz3v-e00c4760e743ec5b8919295b560e3279'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Data protection obliges companies to treat customer data etc. with care. In doing so, data protection offers additional options for individuals, especially since the introduction of the GDPR. If your data in a directory is no longer up-to-date or incorrect, or if you do not want your personal data to continue to be stored in an online shop, this has now been explicitly regulated in the GDPR. By means of a request for information, various companies and service providers must hand over all of a person's stored data and process or delete it upon request.<\/p>\n<\/div><\/section><\/p><\/div>\n<div  id=\"kontrollen-und-ueberpruefung\"  class='flex_column av-lfjk4235-823a3ea91955466d9145efda3c8c0c84 av_one_full  avia-builder-el-23  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjwtfc-c4276b68c5cf3c992fcb0c5386502c6e\">\n#top .av-special-heading.av-lfjjwtfc-c4276b68c5cf3c992fcb0c5386502c6e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjjwtfc-c4276b68c5cf3c992fcb0c5386502c6e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjwtfc-c4276b68c5cf3c992fcb0c5386502c6e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lfjjwtfc-c4276b68c5cf3c992fcb0c5386502c6e av-special-heading-h2 blockquote modern-quote  avia-builder-el-24  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Regular checks and inspections<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjwnxb-34bf2e7f5dad4d19a98058cb089881f7'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Unfortunately, it is often difficult for the average consumer to understand to what extent companies in reality comply with their obligations in terms of data protection. For this reason, so-called \"data protection <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/supervisory-authority\">data protection supervisory authorities<\/a> which carries out such checks and investigates possible violations in the event of suspicious circumstances. In Germany, in addition to the Federal Commissioner for Data Protection and Information Security, there is a State Data Protection Commissioner for each federal state. In total, Germany has 17 supervisory authorities for data protection.<\/p>\n<p>Companies of all sizes - from micro-enterprises to large corporations - are required to have a <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/documentation-obligation-gdpr\">data protection documentation<\/a> in accordance with the GDPR and, in the event of an inspection by the supervisory authorities, be able to demonstrate this. Therefore, it is recommended to select a person in the company, regardless of whether this is mandatory due to the size of the company, who takes care of data protection issues of all kinds.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjk4w32-746b96f4465dee6fb5e53f6797d1fa0d\">\n#top .av-special-heading.av-lfjk4w32-746b96f4465dee6fb5e53f6797d1fa0d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjk4w32-746b96f4465dee6fb5e53f6797d1fa0d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjk4w32-746b96f4465dee6fb5e53f6797d1fa0d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"kosten-datenschutz-verstoss\"  class='av-special-heading av-lfjk4w32-746b96f4465dee6fb5e53f6797d1fa0d av-special-heading-h3 blockquote modern-quote  avia-builder-el-26  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >What is the cost of a data breach?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjk5zm3-31498642b393a2f3fcbeafc6dc834929'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Ask yourself the question, are you in any way involved with <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data\" target=\"_blank\" rel=\"noopener\">personal data.<\/a>The answer to this question is yes, then you are obliged to implement this data protection in accordance with the regulations. If the answer to this question is yes, then you are obliged to implement this data protection according to the regulations. Due to the high penalties for data protection violations, you should take care of these issues in a timely manner. The General Data Protection Regulation provides for <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/examples-for-gdpr-fines\">data protection violations fines<\/a> are provided for. These can amount to up to 20 million euros or 4% of a company's global annual turnover, whichever is higher. However, prison sentences of up to 3 years are also possible if the data protection provisions are violated.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjk5h2o-7d8466b60c1fd627e9a2e83ea1f7ee2c\">\n#top .av-special-heading.av-lfjk5h2o-7d8466b60c1fd627e9a2e83ea1f7ee2c{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjk5h2o-7d8466b60c1fd627e9a2e83ea1f7ee2c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjk5h2o-7d8466b60c1fd627e9a2e83ea1f7ee2c .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"datenschutz-haftung\"  class='av-special-heading av-lfjk5h2o-7d8466b60c1fd627e9a2e83ea1f7ee2c av-special-heading-h3 blockquote modern-quote  avia-builder-el-28  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Who is liable for breaches of the Data Protection Act?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjk66ln-f25e4ea5758504114b9072ddf9d418d1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Many companies order a so-called <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-officer-gdpr\">Data Protection Officer<\/a> and leave the topic behind from now on. However, such behavior does not relieve the company of liability in the event of damage. This is because the appointment as data protection officer does not necessarily mean the complete assumption of liability. In the case of simple violations, the managing director or another manager will still be held responsible.<\/p>\n<p>The data protection officer or another employee can only be held accountable if intentional or grossly negligent conduct in the handling of personal data can be proven. As an entrepreneur, you are therefore always well advised to check for yourself from time to time whether the data protection provisions are being complied with in your company in the best possible way.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5u9u9m-e831dc7163dfb5679480d80208de1a10\">\n.flex_column.av-5u9u9m-e831dc7163dfb5679480d80208de1a10{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"video\"  class='flex_column av-5u9u9m-e831dc7163dfb5679480d80208de1a10 av_one_full  avia-builder-el-30  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lty3t5ok-48b14cf0d36730138b100b2593341e09\">\n#top .av-special-heading.av-lty3t5ok-48b14cf0d36730138b100b2593341e09{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lty3t5ok-48b14cf0d36730138b100b2593341e09 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lty3t5ok-48b14cf0d36730138b100b2593341e09 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lty3t5ok-48b14cf0d36730138b100b2593341e09 av-special-heading-h2 blockquote modern-quote  avia-builder-el-31  el_before_av_image  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Video: Implementing a data protection management system with Robin Data ComplianceOS\u00ae<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lty3tdcn-6c5813eca09baedee056c3b43c849b2c\">\n.avia-image-container.av-lty3tdcn-6c5813eca09baedee056c3b43c849b2c img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-lty3tdcn-6c5813eca09baedee056c3b43c849b2c .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-lty3tdcn-6c5813eca09baedee056c3b43c849b2c av-styling- av-img-linked avia-align-left  avia-builder-el-32  el_after_av_heading  el_before_av_hr  tp_de2'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"#formular\" class='avia_image'  aria-label='Video-Hack-DSMS'><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-16539 avia-img-lazy-loading-not-16539 avia_image' src=\"https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-1030x566.png\" alt='Video data protection management system' title='Video-Hack-DSMS'  height=\"566\" width=\"1030\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-1030x566.png 1030w, https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-300x165.png 300w, https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-768x422.png 768w, https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-1536x845.png 1536w, https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-18x10.png 18w, https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-1500x825.png 1500w, https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS-705x388.png 705w, https:\/\/media.robin-data.io\/2021\/03\/19091617\/Video-Hack-DSMS.png 1902w\" sizes=\"(max-width: 1030px) 100vw, 1030px\" \/><\/a><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-cwuy2-24cb3337431541a635d7800be81a50a8\">\n#top .hr.hr-invisible.av-cwuy2-24cb3337431541a635d7800be81a50a8{\nheight:25px;\n}\n<\/style>\n<div  id=\"schritte\"  class='hr av-cwuy2-24cb3337431541a635d7800be81a50a8 hr-invisible  avia-builder-el-33  el_after_av_image  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  id=\"formular\"  class='av_textblock_section av-lty3tpzd-af39d334057fd2f0119af59ef771658e'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px; color: #00b3bd;\">Implement data protection management system with Robin Data ComplianceOS\u00ae<\/p>\n<p>Organisations have numerous obligations to fulfil in order to ensure compliance with the General Data Protection Regulation (GDPR). It often takes a considerable amount of time and money to build up the necessary expertise, gain a holistic overview of data protection and set up a data protection management system (DMS).<\/p>\n<p>In the Robin Data Hacks on the topic of data protection management systems, we show you how you can implement your data protection digitally and systematically control, monitor and document the measures required by law when handling personal data.<\/p>\n<p>The video is a recording of the Robin Data Hack. The Robin Data Hacks take place online and participation is free of charge. <a href=\"https:\/\/www.robin-data.io\/en\/events\/hacks\">Further information, dates and the opportunity to register.<\/a><\/p>\n<\/div><\/section><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-229sju-d5b8d72c8042172bd9b6f89ac01b3dee\">\n.avia_message_box.av-229sju-d5b8d72c8042172bd9b6f89ac01b3dee{\nbackground-color:rgba(244,150,0,0.3);\ncolor:#303440;\n}\n.avia_message_box.av-229sju-d5b8d72c8042172bd9b6f89ac01b3dee .avia_message_box_icon.avia-svg-icon svg:first-child{\nfill:#303440;\nstroke:#303440;\n}\n<\/style>\n<div id='avia-messagebox-' class='avia_message_box av_notification av-229sju-d5b8d72c8042172bd9b6f89ac01b3dee avia-color-custom avia-size-large avia-icon_select-no avia-border-  avia-builder-el-36  el_after_av_codeblock  avia-builder-el-last  tp_en2' ><div class=\"avia_message_box_content\"><p>Unfortunately this content is currently only available in German. Please feel free to <a href=\"https:\/\/www.robin-data.io\/en\/contact#formular\">contact us<\/a> for more information.<\/p>\n<\/div><\/div><\/p><\/div>\n<div  id=\"unterschied-datenschutz-datensicherheit\"  class='flex_column av-lfjk6j3r-75f0e7ee1a07623bfa6ee810a45258da av_one_full  avia-builder-el-37  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfjjzsbp-1dc56ccde7bfd510834b1a4b57f62541\">\n#top .av-special-heading.av-lfjjzsbp-1dc56ccde7bfd510834b1a4b57f62541{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lfjjzsbp-1dc56ccde7bfd510834b1a4b57f62541 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfjjzsbp-1dc56ccde7bfd510834b1a4b57f62541 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lfjjzsbp-1dc56ccde7bfd510834b1a4b57f62541 av-special-heading-h2 blockquote modern-quote  avia-builder-el-38  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >What is the difference between data protection and data security?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lfjjzezk-028f702d61139e3c567408933facc35f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The difference between data protection and data security is that data protection refers to the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/right-to-informational-self-determination\">Informational self-determination<\/a>g and the protection of privacy is limited. The focus here is on personal data. In contrast, data security is broader and concerns all types of data that must be protected against unauthorised access, misuse and loss. The means for these measures are regulated in the TOM, for example the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/pseudonymised-data\">pseudonymisation<\/a>. Data protection and data security can be summarised with the following questions:<\/p>\n<ul>\n<li style=\"font-size: 20px;\">Data protection: May <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data\">individual-related data<\/a> collected and processed?<\/li>\n<li style=\"font-size: 20px;\">Data security: What are the best measures to protect data from unauthorised access?<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-40  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-42  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics&#038;t=Datenschutz' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Datenschutz&#038;url=https:\/\/www.robin-data.io\/en\/?p=8490' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Datenschutz&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Datenschutz&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-43  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">This might interest you too:<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-45  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-46  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-17156 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms' data-rel='slide-1' class='slide-image' title='DSMS according to GDPR: Structure &amp; practical implementation'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"341\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1-495x341.jpg\" class=\"wp-image-14089 avia-img-lazy-loading-not-14089 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: DSMS according to GDPR: Structure &amp; practical implementation\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms' title='DSMS according to GDPR: Structure &amp; practical implementation'>DSMS according to GDPR: Structure &amp; practical implementation<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Learn all about templates, structure and implementation of a GDPR-compliant data protection management system (DMS).<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-23T09:41:39+02:00\" >23 April 2025<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/datenschutz-management-system-dsgvo-dsms#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>341<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-03-03T13:36:27+01:00\" >2025-04-23 09:41:39<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-23 09:44:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>DSMS according to GDPR: Structure &amp; practical implementation<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-17123 slide-entry-overview slide-loop-2 slide-parity-even  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden' data-rel='slide-1' class='slide-image' title='AI and data protection in practice'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2025\/01\/27132208\/kuenstliche-intelligenz-ai-495x343.png\" class=\"wp-image-16986 avia-img-lazy-loading-not-16986 attachment-portfolio size-portfolio wp-post-image\" alt=\"artificial intelligence\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: AI and data protection in practice\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden' title='AI and data protection in practice'>AI and data protection in practice<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Find out how artificial intelligence can be used in compliance with the GDPR. A practical guide.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-07T13:24:22+02:00\" >7 April 2025<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden#comments'>4 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2025\/01\/27132208\/kuenstliche-intelligenz-ai.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-03-03T13:36:27+01:00\" >2025-04-07 13:24:22<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-07 13:46:33<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>AI and data protection in practice<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Data protection is generally the protection of personal data of each individual against their unauthorised collection, processing and disclosure.<\/p>","protected":false},"author":3,"featured_media":14061,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[37,122],"class_list":["post-8490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-datenschutz","tag-einfuehrung"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was ist Datenschutz?<\/title>\n<meta name=\"description\" content=\"Verstehen Sie die Bedeutung des Datenschutzes in der heutigen Zeit und wie Sie Ihre pers\u00f6nlichen Daten sicher verwalten k\u00f6nnen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datenschutz\" \/>\n<meta property=\"og:description\" content=\"Verstehen Sie die Bedeutung des Datenschutzes in der heutigen Zeit und wie Sie Ihre pers\u00f6nlichen Daten sicher verwalten k\u00f6nnen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-03T12:36:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T15:18:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Caroline Schwabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline Schwabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen\"},\"author\":{\"name\":\"Caroline Schwabe\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"headline\":\"Datenschutz\",\"datePublished\":\"2021-03-03T12:36:27+00:00\",\"dateModified\":\"2025-03-24T15:18:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen\"},\"wordCount\":6814,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg\",\"keywords\":[\"Datenschutz\",\"Einf\u00fchrung\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen\",\"name\":\"Was ist Datenschutz?\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg\",\"datePublished\":\"2021-03-03T12:36:27+00:00\",\"dateModified\":\"2025-03-24T15:18:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"description\":\"Verstehen Sie die Bedeutung des Datenschutzes in der heutigen Zeit und wie Sie Ihre pers\u00f6nlichen Daten sicher verwalten k\u00f6nnen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Datenschutz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\",\"name\":\"Caroline Schwabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"caption\":\"Caroline Schwabe\"},\"description\":\"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/csc\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is data protection?","description":"Understand the importance of data protection in today's world and how you can manage your personal data securely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics","og_locale":"en_GB","og_type":"article","og_title":"Datenschutz","og_description":"Verstehen Sie die Bedeutung des Datenschutzes in der heutigen Zeit und wie Sie Ihre pers\u00f6nlichen Daten sicher verwalten k\u00f6nnen.","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2021-03-03T12:36:27+00:00","article_modified_time":"2025-03-24T15:18:16+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg","type":"image\/jpeg"}],"author":"Caroline Schwabe","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Caroline Schwabe","Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen"},"author":{"name":"Caroline Schwabe","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"headline":"Datenschutz","datePublished":"2021-03-03T12:36:27+00:00","dateModified":"2025-03-24T15:18:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen"},"wordCount":6814,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg","keywords":["Datenschutz","Einf\u00fchrung"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen","name":"What is data protection?","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg","datePublished":"2021-03-03T12:36:27+00:00","dateModified":"2025-03-24T15:18:16+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"description":"Understand the importance of data protection in today's world and how you can manage your personal data securely.","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150319\/EU-US-Privacy-Shield.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-grundlagen#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Datenschutz"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5","name":"Caroline Schwabe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","caption":"Caroline Schwabe"},"description":"Ms. Schwabe is an information designer and Data Protection Officer. The focus of her work is to help customers and interested parties with contributions to the Robin Data Privacy Academy.","url":"https:\/\/www.robin-data.io\/en\/author\/csc"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/8490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=8490"}],"version-history":[{"count":35,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/8490\/revisions"}],"predecessor-version":[{"id":9736,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/8490\/revisions\/9736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14061"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=8490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=8490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=8490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}