{"id":977,"date":"2020-03-26T14:24:28","date_gmt":"2020-03-26T13:24:28","guid":{"rendered":"https:\/\/87adsf68asd7f6.tatooine.link\/?p=977"},"modified":"2025-03-24T13:37:51","modified_gmt":"2025-03-24T12:37:51","slug":"data-protection-data-security-home-office","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office","title":{"rendered":"Data protection and data security while working from home"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-72o6x-805e98ee2bf8dbc659829ebaa5af7a1b\">\n.flex_column.av-72o6x-805e98ee2bf8dbc659829ebaa5af7a1b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-72o6x-805e98ee2bf8dbc659829ebaa5af7a1b av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kraw99z8-c81ee0fe589cb7457159c3d7d592d195'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a>\u00a0\u00bb\u00a0<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\">Data Protection News<\/a> \u00bb <strong>Data protection and data security while working from home<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ka7vzkdw-26135c70b1f01fdd8cc0de6eec014515\">\n.avia-image-container.av-ka7vzkdw-26135c70b1f01fdd8cc0de6eec014515 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-ka7vzkdw-26135c70b1f01fdd8cc0de6eec014515 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-ka7vzkdw-26135c70b1f01fdd8cc0de6eec014515 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  avia-builder-el-last'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14099 avia-img-lazy-loading-not-14099 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg\" alt='A woman works in a home office and pays attention to data protection and data security' title=''  height=\"341\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice-300x149.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-fe6ll-83991d45eb22e308afc40d55fc2c2f83\">\n.flex_column.av-fe6ll-83991d45eb22e308afc40d55fc2c2f83{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-fe6ll-83991d45eb22e308afc40d55fc2c2f83 av_one_full  avia-builder-el-3  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-7j38p-1ae0726621bdf922c385f1d0979da8f3'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span style=\"color: #303440;\">Data protection and data security while working from home<\/span><\/h1>\n<p>The Corona pandemic is also forcing companies where there is normally no remote working option to let their employees work from home. Now, under high time pressure, companies have to find pragmatic solutions that preserve their ability to work and at the same time <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\">Data protection<\/a> and ensure data security. Many data controllers have not yet issued corresponding regulations and guidelines. It is now necessary to quickly follow suit and to formulate the rules clearly and transparently in order to clarify the rights and obligations of employers and employees.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-7j38p-1-d7e2244fd35c4fddfa90ef688d749ffd'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>If an employee works from home, they must observe the same data protection rules as for their office work. The responsibility of the company and thus possibly also the personal liability of the management remains. So they do not end at the company door.<\/p>\n<h2>Tips for data protection and data security in the home office: Employers<\/h2>\n<p>For the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/general-data-protection-regulation-eu-gdpr\">GDPR<\/a> it does not matter who processes the data and where. The decisive factor is who decides on the purposes and means of data processing. This is regularly the\u00a0<strong>Employers<\/strong>. They should take the following measures:<\/p>\n<ul>\n<li>Determine which hardware and software may be used in the home office!<\/li>\n<li>Access to IT systems and computers from the home must be secured with a password.<\/li>\n<li>Access to the company's systems should only be possible via a VPN. This VPN should be tested for its resilience before a large number of employees access it.<\/li>\n<li>Ensure that stationary computers and mobile data carriers are encrypted like USB sticks! Employees should also encrypt e-mails sufficiently if they contain sensitive personal data or business secrets.<\/li>\n<li>Ideally, the employer provides its employees with the IT equipment they need to work in their home office in a data-protection-compliant manner.<\/li>\n<li>To ensure that data is always available, it should be possible to back up the data remotely to the company. Local storage should be avoided.<\/li>\n<li>Require employees to report data breaches and other safety-related incidents quickly!<\/li>\n<\/ul>\n<h2>Tips for data protection and data security in the home office: Employees<\/h2>\n<p><strong>Employees<\/strong>\u00a0should observe the following while working from home when processing or accessing personal data there:<\/p>\n<ul>\n<li>These data may not be viewed by third parties, i.e. not even by relatives or fellow residents. Ideally, personal data should be processed in a separate room and stored in a lockable cabinet. This applies to digital and analogue data.<\/li>\n<li>IT equipment provided by the employer should not be used privately or by family members.<\/li>\n<li>If USB sticks are used for storage, you have to use sticks from the employer. This also applies to other data carriers. They must not contain private files.<\/li>\n<li>Professional e-mails must not be forwarded to private e-mail boxes of colleagues.<\/li>\n<li>Printouts should be avoided. If you use paper documents, they should not be left lying around openly readable for others.<\/li>\n<li>The destruction of documents should also be carried out in accordance with data protection rules. Printouts of personal data and other sensitive content must at least be torn into small pieces.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-72y81-d0552b3b146bf0cf17b5fc65d064e14e\">\n.flex_column.av-72y81-d0552b3b146bf0cf17b5fc65d064e14e{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-72y81-d0552b3b146bf0cf17b5fc65d064e14e av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-ky8jzxgh-bb377779f3aed779c4f458ba3519854a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Data Protection Officer<\/strong><\/p>\n<p>You are welcome to contact us as\u00a0<strong>external data protection officer (DPO)\u00a0<\/strong>order. We also offer individual consulting services as well as audits and will be happy to provide you with a non-binding offer. You can find more information about our external data protection officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-ky8k04ai-c7011e6f2899260ab960f4d058eeec76-wrap avia-button-left  avia-builder-el-8  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/data-protection-as-a-service'  class='avia-button av-ky8k04ai-c7011e6f2899260ab960f4d058eeec76 av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover DSB services\"><span class='avia_iconbox_title' >Discover DSB services<\/span><\/a><\/div><\/p><\/div><\/p>\n<div  class='flex_column av-6u7ep-ed46dda1372c60ebcff7890a6439dbe3 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-k9xyhrk1-1267522ab7281aed27cb04f961f8c1ff'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Recommendations for data security<\/h2>\n<p>Many technical and organisational measures must also be taken for data security from home. Companies should also orient themselves to the catalogues of ISO 27001 or the BSI basic protection in teleworking. The choice of measures should be based on the concrete risk of processing at the respective location. The GDPR bases its risk assessment on the type, scope, circumstances and purposes of processing and on the actual probability of a risk occurring.<\/p>\n<p>Of course, spontaneous solutions for remote working usually cannot fully implement all IT security requirements. In many cases, private hardware, software and network connections are used as an alternative. It is also possible that not all components that companies make available on an ad hoc basis are state-of-the-art in terms of data security. Faster and more stable network connections, the establishment of VPN solutions and the acquisition of suitable hardware often cannot be achieved at short notice.<\/p>\n<p>The BSI recommends some measures to companies that lay the foundation for IT security in mobile working without much effort:<\/p>\n<ul>\n<li>Make clear and binding regulations in writing regarding IT security and the security of your data and communicate them to all parties involved!<\/li>\n<li>Ensure clear contact points and communication channels that can be verified by the employees!<\/li>\n<\/ul>\n<h2>Greater danger from phishing<\/h2>\n<p>At present, new phishing mails may increasingly appear, which will exploit the current crisis situation and attempt to access sensitive data, for example, with references to remote access, security tips and the resetting of passwords. At their home desks, employees often have to see for themselves, without training, how they cope with new video conferencing software and unfamiliar collaboration platforms. This can also make it easier for phishing perpetrators to deceive.<\/p>\n<p>The BSI lists further tips here:\u00a0<a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/empfehlung_home_office.pdf?__blob=publicationFile&amp;v=9\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">BSI recommendations on the subject of home office<\/a><\/p>\n<p>The members of the Federal Association for IT Security (TeleTrusT) provide free IT security solutions including remote consulting for three months:<br \/>\n<a href=\"https:\/\/www.teletrust.de\/kostenfreie-it-sicherheitsloesungen\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.teletrust.de\/kostenfreie-it-sicherheitsloesungen\/<\/a><\/p>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-11  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-13  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office&#038;t=Datenschutz%20und%20Datensicherheit%20im%20Homeoffice' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Datenschutz%20und%20Datensicherheit%20im%20Homeoffice&#038;url=https:\/\/www.robin-data.io\/en\/?p=977' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Datenschutz%20und%20Datensicherheit%20im%20Homeoffice&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Datenschutz%20und%20Datensicherheit%20im%20Homeoffice&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-14  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-16  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-17  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-17123 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden' data-rel='slide-1' class='slide-image' title='AI and data protection in practice'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2025\/01\/27132208\/kuenstliche-intelligenz-ai-495x343.png\" class=\"wp-image-16986 avia-img-lazy-loading-not-16986 attachment-portfolio size-portfolio wp-post-image\" alt=\"artificial intelligence\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: AI and data protection in practice\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden' title='AI and data protection in practice'>AI and data protection in practice<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Find out how artificial intelligence can be used in compliance with the GDPR. A practical guide.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-07T13:24:22+02:00\" >7 April 2025<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/ki-und-datenschutz-praxisleitfaden#comments'>4 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2025\/01\/27132208\/kuenstliche-intelligenz-ai.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-03-26T14:24:28+01:00\" >2025-04-07 13:24:22<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-07 13:46:33<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>AI and data protection in practice<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-16316 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7' data-rel='slide-1' class='slide-image' title='TISAX requirements: Prepare certification step by step'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-495x343.png\" class=\"wp-image-15255 avia-img-lazy-loading-not-15255 attachment-portfolio size-portfolio wp-post-image\" alt=\"IT security incident\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: TISAX requirements: Prepare certification step by step\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7' title='TISAX requirements: Prepare certification step by step'>TISAX requirements: Prepare certification step by step<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >TISAX\u00ae requirements: Information on the question catalogue, maturity levels and certification. Prepare the assessment level and audit.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-01-08T13:19:57+01:00\" >8 January 2024<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-03-26T14:24:28+01:00\" >2024-01-08 13:19:57<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 16:15:24<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>TISAX requirements: Prepare certification step by step<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-15168 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident' data-rel='slide-1' class='slide-image' title='What to do in the event of an IT security incident?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-495x343.png\" class=\"wp-image-15255 avia-img-lazy-loading-not-15255 attachment-portfolio size-portfolio wp-post-image\" alt=\"IT security incident\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What to do in the event of an IT security incident?\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident' title='What to do in the event of an IT security incident?'>What to do in the event of an IT security incident?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The most important facts about IT security incidents. Learn practical tips on recognising and dealing with IT emergencies in the article.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-12-07T13:52:45+01:00\" >7 December 2022<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-03-26T14:24:28+01:00\" >2022-12-07 13:52:45<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What to do in the event of an IT security incident?<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>What do employers and employees need to be aware of? Concrete tips on data protection and advice on data security. <\/p>","protected":false},"author":9,"featured_media":14099,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[36,37,41,42],"class_list":["post-977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-covid-19","tag-datenschutz","tag-datensicherheit","tag-homeoffice"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Datenschutz und Datensicherheit im Homeoffice | News<\/title>\n<meta name=\"description\" content=\"Was m\u00fcssen Arbeitgeber und Arbeitnehmer zu Datenschutz und Datensicherheit im Homeoffice beachten? Konkrete Tipps jetzt lesen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datenschutz und Datensicherheit im Homeoffice\" \/>\n<meta property=\"og:description\" content=\"Was m\u00fcssen Arbeitgeber und Arbeitnehmer zu Datenschutz und Datensicherheit im Homeoffice beachten? Konkrete Tipps jetzt lesen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T13:24:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:37:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ulrich Hottelet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ulrich Hottelet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice\"},\"author\":{\"name\":\"Ulrich Hottelet\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"headline\":\"Datenschutz und Datensicherheit im Homeoffice\",\"datePublished\":\"2020-03-26T13:24:28+00:00\",\"dateModified\":\"2025-03-24T12:37:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice\"},\"wordCount\":2309,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg\",\"keywords\":[\"COVID-19\",\"Datenschutz\",\"Datensicherheit\",\"Homeoffice\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice\",\"name\":\"Datenschutz und Datensicherheit im Homeoffice | News\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg\",\"datePublished\":\"2020-03-26T13:24:28+00:00\",\"dateModified\":\"2025-03-24T12:37:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"description\":\"Was m\u00fcssen Arbeitgeber und Arbeitnehmer zu Datenschutz und Datensicherheit im Homeoffice beachten? Konkrete Tipps jetzt lesen!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg\",\"width\":685,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Datenschutz und Datensicherheit im Homeoffice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\",\"name\":\"Ulrich Hottelet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"caption\":\"Ulrich Hottelet\"},\"description\":\"Freier IT-Journalist mit den Schwerpunkten Datenschutz, IT-Sicherheit und K\u00fcnstliche Intelligenz.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/support\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data protection and data security in the home office | News","description":"What do employers and employees have to consider regarding data protection and data security in the home office? Read concrete tips now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office","og_locale":"en_GB","og_type":"article","og_title":"Datenschutz und Datensicherheit im Homeoffice","og_description":"Was m\u00fcssen Arbeitgeber und Arbeitnehmer zu Datenschutz und Datensicherheit im Homeoffice beachten? Konkrete Tipps jetzt lesen!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-data-security-home-office","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2020-03-26T13:24:28+00:00","article_modified_time":"2025-03-24T12:37:51+00:00","og_image":[{"width":685,"height":341,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg","type":"image\/jpeg"}],"author":"Ulrich Hottelet","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Ulrich Hottelet","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice"},"author":{"name":"Ulrich Hottelet","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"headline":"Datenschutz und Datensicherheit im Homeoffice","datePublished":"2020-03-26T13:24:28+00:00","dateModified":"2025-03-24T12:37:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice"},"wordCount":2309,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg","keywords":["COVID-19","Datenschutz","Datensicherheit","Homeoffice"],"articleSection":["News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice","name":"Data protection and data security in the home office | News","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg","datePublished":"2020-03-26T13:24:28+00:00","dateModified":"2025-03-24T12:37:51+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"description":"What do employers and employees have to consider regarding data protection and data security in the home office? Read concrete tips now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150704\/homeoffice.jpg","width":685,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-datensicherheit-homeoffice#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Datenschutz und Datensicherheit im Homeoffice"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515","name":"Ulrich Hottelet","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","caption":"Ulrich Hottelet"},"description":"Freelance IT journalist specialising in data protection, IT security and artificial intelligence.","url":"https:\/\/www.robin-data.io\/en\/author\/support"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=977"}],"version-history":[{"count":15,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/977\/revisions"}],"predecessor-version":[{"id":10534,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/977\/revisions\/10534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14099"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}