{"id":969,"date":"2020-03-26T14:45:18","date_gmt":"2020-03-26T13:45:18","guid":{"rendered":"https:\/\/87adsf68asd7f6.tatooine.link\/?p=969"},"modified":"2025-01-22T09:14:52","modified_gmt":"2025-01-22T08:14:52","slug":"practical-insights-data-protection-officers","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/practical-insights-data-protection-officers","title":{"rendered":"Data protection officers report from the field"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9bmjd-f6a6af6b79d87143a8e1512583571d36\">\n.flex_column.av-9bmjd-f6a6af6b79d87143a8e1512583571d36{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9bmjd-f6a6af6b79d87143a8e1512583571d36 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kraw85da-fccbea6465584c058be184c7ffb38ee0'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a>\u00a0\u00bb\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\">Data Protection News<\/a>\u00a0\u00bb\u00a0<strong>Data protection officers report from the field<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ka2j12hp-14b8dc7a8b31eb8304c3e62acffc1362\">\n.avia-image-container.av-ka2j12hp-14b8dc7a8b31eb8304c3e62acffc1362 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-ka2j12hp-14b8dc7a8b31eb8304c3e62acffc1362 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-ka2j12hp-14b8dc7a8b31eb8304c3e62acffc1362 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  avia-builder-el-last'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14089 avia-img-lazy-loading-not-14089 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg\" alt='Four data protection commissioners give themselves fistbumps' title=''  height=\"341\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1-300x149.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-deehl-5b91e3ee9bcfc7e4252a3675684a6deb\">\n.flex_column.av-deehl-5b91e3ee9bcfc7e4252a3675684a6deb{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-deehl-5b91e3ee9bcfc7e4252a3675684a6deb av_one_full  avia-builder-el-3  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-k9tm7vdq-b82f388a9b8e677657858debac5d3704'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span style=\"color: #303440;\">Data protection officers report from the field<\/span><\/h1>\n<p>Data protection officers have a variety of experiences in their contacts with corporate customers. There is still widespread ignorance about data protection, and many people find dealing with it a nuisance. Yet companies can benefit from the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\">Data protection<\/a> benefit economically. We spoke about their experiences with Wolfgang Evers and Stefan Schumann, the managing directors of Datenschutzzentrale GmbH. The consulting firm has mainly medium-sized companies from many industries and municipalities as clients and is a partner of Robin Data. Learn more in our article \"Data protection officers report from practice\".<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k9tm7vdq-1-36c9e9f0104be7e4714d4c52686a7d6a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Interview: Data protection officers report from practice<\/h2>\n<p>Our partners report in an interview <a href=\"https:\/\/www.robin-data.io\/en\/about-us\/#wev\">Wolfgang Evers<\/a> and the <a href=\"https:\/\/www.robin-data.io\/en\/about-us\/#ssc\">Stefan Schumann<\/a>.<\/p>\n<h3>What are the most common problems you are confronted with in your consulting practice?<\/h3>\n<p><strong>Evers<\/strong>Companies have no time, little money and no competence for data protection.<\/p>\n<p><strong>Schumann<\/strong>Many people mistakenly believe that a privacy statement on the website is sufficient. In fact, this represents only a small percentage of the necessary concern with privacy. The importance of employee privacy is also often overlooked. Employment contracts are not documented, there are forbidden records of employees and identifiers are not deleted, even though the employees concerned have long since left the company.<\/p>\n<h3>Does dealing with data protection have economic advantages for companies in addition to compliance with legal regulations?<\/h3>\n<p><strong>Evers<\/strong>There are synergies between data protection and management. The management gets a better overview of the processes and becomes aware of construction sites in the company. Examples are the time recording of employees, their video surveillance and sick leave lists. Everything that leads to behavioral control is in conflict with data protection. We must create awareness of this, especially because some processes have been practiced in this way for decades.<\/p>\n<p><strong>Schumann<\/strong>Companies that have experienced data breaches have informed the affected customers. This had such a positive effect on them that they made further purchases from these companies. So you can score points with a high awareness of data protection among customers.<\/p>\n<h3>What are the main sticking points in implementation from your perspective as a data protection officer?<\/h3>\n<p><strong>Schumann<\/strong>These are the extensive\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/documentation-obligation-gdpr\" target=\"_blank\" rel=\"noopener noreferrer\">documentation obligations<\/a>. The situation is made more difficult by the fact that some data protection officers make companies insecure and disseminate false information. This applies to both external and internal officers. Among the external ones there are dubious ones and not all of the internal ones are sufficiently trained.<\/p>\n<h3>Which questions are asked particularly frequently in practice?<\/h3>\n<p><strong>Evers<\/strong>Most customers are ignorant. Therefore, we first give a one-hour orientation on data protection.<\/p>\n<p><strong>Schumann<\/strong>I'm usually asked about the\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/directory-of-processing-activities-2\" target=\"_blank\" rel=\"noopener noreferrer\">record of processing activities<\/a>\u00a0This results in the necessary measures in IT security and organisation. There is also a lack of understanding in the contracts for commissioned data processing. If the external service provider does not take care of data protection, it is of no use to comply with it yourself.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7z0jd-67c3c6fb05e2fe86c4f8290b36fff764\">\n.flex_column.av-7z0jd-67c3c6fb05e2fe86c4f8290b36fff764{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-7z0jd-67c3c6fb05e2fe86c4f8290b36fff764 av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-ky1t8d72-18e15e7b94bf4444c7a01e86822bad6f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Data Protection Officer<\/strong><\/p>\n<p>You are welcome to contact us as <strong>external data protection officer (DPO) <\/strong>order. We also offer individual consulting services as well as audits and will be happy to provide you with a non-binding offer. You can find more information about our external data protection officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-ky1t8ky5-157e91461686f2d366fcc192a117f149-wrap avia-button-left  avia-builder-el-8  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/data-protection-as-a-service'  class='avia-button av-ky1t8ky5-157e91461686f2d366fcc192a117f149 av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover DSB services\"><span class='avia_iconbox_title' >Discover DSB services<\/span><\/a><\/div><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9ey4x-4e2526b89009190a2f704a73a814b725\">\n.flex_column.av-9ey4x-4e2526b89009190a2f704a73a814b725{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9ey4x-4e2526b89009190a2f704a73a814b725 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-k9tnku3p-d6d04710fc6a0f058d9c95a4bd6430dd'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What is your motivation to deal with the topic of data protection?<\/h3>\n<p><strong>Schumann<\/strong>: Data protection does not only concern companies, but every single one of us. Just ask Apple or Amazon and make use of your right to information according to\u00a0<a href=\"https:\/\/help.robin-data.io\/artikel-15-dsgvo\" target=\"_blank\" rel=\"noopener noreferrer\">Article 15 GDPR<\/a>\u00a0use. I did this at Apple and was amazed at the extent and dimension of the data stored about me and my devices.<\/p>\n<p><strong>Evers<\/strong>I have been educating people about data protection since 1993, back then as an employee of the Federal Employment Agency, the largest German authority. At that time, data protection only played a marginal role. As IT security became more and more important, the importance of data protection also grew. When the Citizens' Network started in Bavaria after the year 2000, I informed people at adult education centers about the data traces of users. So I grew into data protection.<\/p>\n<h3>As a partner of Robin Data, you regularly work with the data protection management software. What is your experience?<\/h3>\n<p><strong>Evers<\/strong>The software can automate processes that would otherwise have to be carried out manually. This means that data protection can be implemented in just a few hours. The fact that the costs can be calculated on a monthly basis is also attractive for medium-sized companies. Originally, we wanted to develop such software ourselves, but we didn't push and elaborate on it enough. Robin Data, on the other hand, has done so.<\/p>\n<p><a href=\"https:\/\/www.robin-data.io\/en\/about-us\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about the Robin Data team.<\/a><\/p>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-11  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-13  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/practical-insights-data-protection-officers&#038;t=Datenschutzbeauftragte%20berichten%20aus%20der%20Praxis' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Datenschutzbeauftragte%20berichten%20aus%20der%20Praxis&#038;url=https:\/\/www.robin-data.io\/en\/?p=969' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Datenschutzbeauftragte%20berichten%20aus%20der%20Praxis&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/practical-insights-data-protection-officers' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Datenschutzbeauftragte%20berichten%20aus%20der%20Praxis&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/practical-insights-data-protection-officers' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-14  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-16  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-17  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-3619 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/smart-home-applications-data-protection' data-rel='slide-1' class='slide-image' title='Smart Home Privacy Concerns'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"341\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice-495x341.jpg\" class=\"wp-image-14099 avia-img-lazy-loading-not-14099 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Smart home data protection concerns\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/smart-home-applications-data-protection' title='Smart Home Privacy Concerns'>Smart Home Privacy Concerns<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Smart Home applications: Find out why the benefits in everyday life often involve data protection risks and how you can protect yourself.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/smart-home-applications-data-protection\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-03-09T11:35:39+01:00\" >9 March 2023<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/smart-home-applications-data-protection#comments'>2 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>341<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-03-26T14:45:18+01:00\" >2023-03-09 11:35:39<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:38<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Smart Home Privacy Concerns<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-15268 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/lieferkettengesetz-lksg-sorgfaltspflichten-unternehmen' data-rel='slide-1' class='slide-image' title='The Supply Chain Act (LkSG)'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender-495x343.jpg\" class=\"wp-image-14058 avia-img-lazy-loading-not-14058 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The Supply Chain Act (LkSG)\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/lieferkettengesetz-lksg-sorgfaltspflichten-unternehmen' title='The Supply Chain Act (LkSG)'>The Supply Chain Act (LkSG)<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The Supply Chain Act (LkSG) came into force on 01.01.2023. Learn about the current regulations and obligations for companies in the article.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/lieferkettengesetz-lksg-sorgfaltspflichten-unternehmen\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-01-02T17:16:21+01:00\" >2 January 2023<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/lieferkettengesetz-lksg-sorgfaltspflichten-unternehmen#comments'>1 Comment<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Nadine Porrmann<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Nadine Porrmann<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-03-26T14:45:18+01:00\" >2023-01-02 17:16:21<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:35<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The Supply Chain Act (LkSG)<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-11537 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law' data-rel='slide-1' class='slide-image' title='What is the TTDSG or TDDDG?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150307\/Betroffenenrechte-495x343.jpg\" class=\"wp-image-14053 avia-img-lazy-loading-not-14053 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What is the TTDSG or TDDDG?\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law' title='What is the TTDSG or TDDDG?'>What is the TTDSG or TDDDG?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The TTDSG became the Telecommunications Digital Services Data Protection Act (TDDDG) on 13 May 2024 as a result of the harmonisation with the EU Directive.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-08-02T13:46:38+02:00\" >2 August 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/german-telecommunication-and-telemedia-privacy-law#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150307\/Betroffenenrechte.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-03-26T14:45:18+01:00\" >2021-08-02 13:46:38<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:19<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What is the TTDSG or TDDDG?<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>What are the most common data protection challenges and economic impacts in practice? \u2714\ufe0fUnsere Partners report. <\/p>","protected":false},"author":9,"featured_media":14089,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Datenschutzbeauftragte berichten aus der Praxis | Interview<\/title>\n<meta name=\"description\" content=\"Was sind die h\u00e4ufigsten Datenschutz-Herausforderungen Praxis? \ufe0fDatenschutzbeauftragte berichten aus der Praxis. Jetzt lesen!\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datenschutzbeauftragte berichten aus der Praxis\" \/>\n<meta property=\"og:description\" content=\"Was sind die h\u00e4ufigsten Datenschutz-Herausforderungen Praxis? \ufe0fDatenschutzbeauftragte berichten aus der Praxis. Jetzt lesen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/practical-insights-data-protection-officers\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T13:45:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T08:14:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ulrich Hottelet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ulrich Hottelet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz\"},\"author\":{\"name\":\"Ulrich Hottelet\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"headline\":\"Datenschutzbeauftragte berichten aus der Praxis\",\"datePublished\":\"2020-03-26T13:45:18+00:00\",\"dateModified\":\"2025-01-22T08:14:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz\"},\"wordCount\":2070,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz\",\"name\":\"Datenschutzbeauftragte berichten aus der Praxis | Interview\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg\",\"datePublished\":\"2020-03-26T13:45:18+00:00\",\"dateModified\":\"2025-01-22T08:14:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"description\":\"Was sind die h\u00e4ufigsten Datenschutz-Herausforderungen Praxis? \ufe0fDatenschutzbeauftragte berichten aus der Praxis. Jetzt lesen!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg\",\"width\":685,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Datenschutzbeauftragte berichten aus der Praxis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\",\"name\":\"Ulrich Hottelet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"caption\":\"Ulrich Hottelet\"},\"description\":\"Freier IT-Journalist mit den Schwerpunkten Datenschutz, IT-Sicherheit und K\u00fcnstliche Intelligenz.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/support\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data protection officers report from practice | Interview","description":"What are the most common privacy challenges practice? \ufe0fDatenschutzbeauftragte report from practice. Read now!","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_GB","og_type":"article","og_title":"Datenschutzbeauftragte berichten aus der Praxis","og_description":"Was sind die h\u00e4ufigsten Datenschutz-Herausforderungen Praxis? \ufe0fDatenschutzbeauftragte berichten aus der Praxis. Jetzt lesen!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/practical-insights-data-protection-officers","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2020-03-26T13:45:18+00:00","article_modified_time":"2025-01-22T08:14:52+00:00","og_image":[{"width":685,"height":341,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg","type":"image\/jpeg"}],"author":"Ulrich Hottelet","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Ulrich Hottelet","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz"},"author":{"name":"Ulrich Hottelet","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"headline":"Datenschutzbeauftragte berichten aus der Praxis","datePublished":"2020-03-26T13:45:18+00:00","dateModified":"2025-01-22T08:14:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz"},"wordCount":2070,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg","articleSection":["News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz","name":"Data protection officers report from practice | Interview","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg","datePublished":"2020-03-26T13:45:18+00:00","dateModified":"2025-01-22T08:14:52+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"description":"What are the most common privacy challenges practice? \ufe0fDatenschutzbeauftragte report from practice. Read now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150650\/Zusammenarbeit-1.jpg","width":685,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutzbeauftragte-praxis-umsetzung-datenschutz#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Datenschutzbeauftragte berichten aus der Praxis"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515","name":"Ulrich Hottelet","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","caption":"Ulrich Hottelet"},"description":"Freelance IT journalist specialising in data protection, IT security and artificial intelligence.","url":"https:\/\/www.robin-data.io\/en\/author\/support"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=969"}],"version-history":[{"count":15,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/969\/revisions"}],"predecessor-version":[{"id":9558,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/969\/revisions\/9558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14089"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}