Online Safety for Parents CEOP

Total Page:16

File Type:pdf, Size:1020Kb

Online Safety for Parents CEOP Welcome to … Online Safety for Parents Luke Brent-Savage Education Child Protection Ltd. Education Child Protection Ltd. CEOP You should always report if your child is, or has been, in contact with some who is… Chatting to your Asking them to child about sex do sexual things on webcam ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre Asking to meet up if Making them feel they’ve only met unsafe them online 1 Parent and Carer Parents Education Child Protection Ltd. Education Child Protection Ltd. Films for primary children… Tell Someone Timon & Pumba EDUCATING CHILDREN Animal Magic Jigsaw Keeping ourselves safe… Keeping ourselves safe… Keep your personal information private 2 Never give out your Top Secrets Keeping ourselves safe… Be kind to your online friends, like you would in the playground at school Education Child Protection Ltd. Keeping ourselves safe… Keeping ourselves safe… Check with an If you get stuck, adult at home If you see or before you something makes visit a new you feel sad or site, game or scared, always app tell a trusted adult Education Child Protection Ltd. UK Safer Internet Centre What else do CEOP say...? WE ARE HERE TO HELP! We are police officers. We take this very seriously TRUST YOUR TUMMY! If anything makes your stomach feel funny, tell an adult you trust, or CEOP Follow the adventure of Smartie the Penguin as he learns how to be safe online when using his tablet. The children must safely guide Smartie to make the correct CHECK YOUR USERNAME! decision. Can they remember Daddy Penguins song to keep Don’t tell people who you are – use a Smartie safe? fun nickname instead… 3 What could you give as answer if someone on a game says to you: “where do you live?” JamieWilliams220408 N O Y B “None of your business…!” Remember almost everything you do on the internet… Advice… It's okay to say ‘no’ …can be seen by other people Remember… if a stranger or someone you don’t like - so be careful what you say and sends you a 'friend' request think before you type! you don’t have to accept it Tell Take a Never Never reply someone screen shot arrange to to emails of any nasty meet up saying you if you're messages – and with have won being don't delete the the lottery bullied on someone message until you you've met or inherited the internet have done this. online – money - they Taking a screen (for example, are fake CHILDREN’S shot saves the getting nasty even if they nasty messages, so emails, from Facebook seem nice, or that you can show people who messages or you think you emails) them to people are trying to know them ONLINE WORLD who can help you trick you 4 Key Stage 1 Key Stage 2 Key Stage 2 Education Child Protection Ltd. How many of the Games below are appropriate for Primary aged children? Very strong violence FrequentA spotlight strong/very on strongthe game language Strong portrayal of sexual activity ScenesGrand of strong Theft sexual Auto violence Strong horror What type of contentStrong blood will and be gore included in this Real sex Druggame? taking Discriminatory language or behaviour Chat WhatsApp ooVoo A group of 15 Nursery's and primary schools in Nantwich, Cheshire, WhatsApp is an Oovoo is a video instant chat app. It lets sent the letter warning adult-themed games, such as Call of Duty and messaging app, Viber Tango you make video Grand Theft Auto, could lead to "early sexualised behaviours". which lets you calls, voice calls send instant Viber lets you Tango is an app and send text messages, text, call, which allows you messages. You images and share photos to make voice can webcam up videos to and send video calls and video to 12 people at friends. messages to calls, and have once. people group chats. 70% of British parents ignore age-ratings on worldwide. games (Techradar) 5 Chat (2) Video Kik Send Safe Skype Facetime Kik is an instant Send Safe is a messaging app Messenger free service, Skype is a Facetime is which lets you which allows you computer video calls over share Messenger is an to send a programme and Monkey Wi-Fi from your messages, message or photo app, which lets iPhone, iPad, Hangouts app which allows YouTube Houseparty photos, games users to IMO via popular you make audio Talk to iPod touch or apps, …that Mac. You can and news, or Google Hangouts communicate and video calls YouTube lets you Strangers! Houseparty is a IMO is a Disappears even make organise events. is a platform by with their to friends and enjoy the videos Monkey connects group video FaceTime calls Google which friends from Message and after seen family. and music you you randomly to chat app. When love. Upload over mobile includes instant their Facebook video chat app, once. another person you and your original content, networks on messaging, account or with your friends who's on the site, friends are in the and family, no and share it all and lets you talk app at the same iPhone or iPad. and phonebook. video chat matter what with friends, to them in a time, you’ll see SMS features. device they are family, and the one-to-one each other on. world. video chat. instantly. Video (Music) Musical.ly KamStar Musical.ly is the Smule Triller KamStar allows world’s largest you to create creative Smule lets you Triller is a Lip Sync platform. The sing your music video Music Video platform makes favourite songs, maker app for with Magical it super easy for use audio effects iPhone. Pick a Effects! Share on everyone to and video filters! song, select the Apps like make awesome Solo privately, portion of the Muscal.ly and videos and share karaoke with song you want to WhatsApp. with friends or to friends, connect use, snap a few the world. with singers takes, and with What's New around the the tap of a - Duet with your world, or duet button you have friends in a new with celebrity a celebrity- split screen artists like Nick quality music mode now. Jonas and Ed video. Sheeran. Video (Live) Social Networks Live.ly Live.me Facebook Twitter Live.ly is a new Live.me is a live live video video streaming Facebook is the Twitter is a Huggle Skout streaming Periscope Twitch You Now app. Allowing biggest social social network platform created you to broadcast network, which messaging Huggle allows Skout is a Social by musical.ly. Owned by Twitch is a live On You Now you and watch live lets users create service that lets you to discover Kiwi Network that is You can start a Twitter, video game can tap ‘Go Live’ chat. Join in a page about you send public and connect with for meeting live.ly to Periscope is a website. You can and… Broadcast discussions with themselves. Kiwi is a fast and message called others who new people broadcast to your live video watch playbacks to a live YouTubers and frequent the easy way to ask 'tweets'. near you. fans and friends, streaming app. of games being audience! Musical.ly stars... same places as your friends Instantly meet and have real- Allows you to played by other Expand your you. See the interesting people close by or time interactions send direct live people. You can social media places you have questions and around the world video feeds to also live stream following, in common. find out what anytime, your Twitter your own comment on Share photos, they think. anywhere! followers. games, and chat videos and buy videos and start to other gamers. virtual gifts. chatting… 6 Pictures & Images Snapchat Instagram PopJam FaceApp Snapchat lets Instagram is a you send a PopJam is a FaceApp is a an picture and photo or short creative website app that video sharing video to your for children and transforms your app. Users can friends. The young people. face! Add a post content and ‘snap’ appears You can share beautiful smile, use hashtags to on screen for a drawings, make yourself share matter of photos and younger or older experiences or seconds before – or swap memories with audio messages disappearing. genders! an online with friends and community. other people. Anonymous Ask.fm Yik Yak Yik Yak is an Ask.fm is a social Anonymous Chat networking site Whisper online bulletin board. It uses the where you can ask Whisper is a social Cool chat rooms. GPS settings on other people network where you Self-destructing your mobile phone questions. It’s up remain messages. Talk to you whether you about anything or tablet to find anonymous, your location and want to ask the with strangers. publish text and question Meet new people, show you the most receive replies ask questions. recent posts from anonymously from other people. or not. Nobody will judge other people It also allows you you, as nobody can around you. to talk with others find out your real through private name. messages. 7 YELLOW… Online Dating A mobile app that allows users to interact with new people Potential risks – Similar to popular ✓ Connecting to users that dating apps… TinderYellow are strangers ✓ Location based data swipe right to ‘like’ / Yellow allows you Tinder is a dating necessary swipe left to ‘pass’. to you meet new app, which used to ✓ Linking to other platforms people around the have two separate ✓ Sharing of information / world. Make new Mutual likes mean communities – one images friends, chat and for adults and one users become ‘friends’ meet new people! ✓ No internal mediation for young Right to like, left Known as : peopleto pass! aged Just like13- ‘Kiddie 17.
Recommended publications
  • Cyberstalking to in Your Area and the People You Care About from Posts How to Stay Safe and Protect and Pictures
    How can I prevent someone from stalking me online? • Be careful what personal information you share online including in email, on social networking sites like Facebook and Twitter and chat rooms. It is very easy to glean information about where you live, the places you love to go Cyberstalking to in your area and the people you care about from posts How to stay safe and protect and pictures. • Create a different email account for registering in social yourself online networking sites and other online spaces. It will help avoid spam and your personal email won´t be revealed if the online service doesn't have a good privacy practice. What is cyberstalking? • Do not feel obligated to fill out all fields when registering Cyberstalking includes (repeatedly) sending threats or online or provide identifying information such as birthdates false accusations via email or mobile phone, making and place in required fields. threatening or false posts on websites, stealing a person's • In your online user profile, use a photo that doesn't identity or data or spying and monitoring a person's identify you or your location, so you can't be recognised. computer and internet use. Sometimes the threats can escalate into physical spaces. • Consider using a name that is not your real name or a nickname as your email name, screen name or user ID. And There are just as many predators on the internet as there try not to use common dates such as your birthday as the are in real life. Anyone can be stalked online but the digits in your email name or password.
    [Show full text]
  • Human Rights Implications of Crime Control in the Digital
    International Journal of Cyber Criminology Vol 2 Issue 1 January 2008 Copyright © 2008 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January-June 2008, Vol 2 (1): 271–285 This is an Open Access article distributed under the terms of the Creative Commons Attribution-Non-Commercial-Share Alike License, which permits unrestricted non- commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking Lynne Roberts1 Curtin University of Technology, Australia Abstract Cyber-stalking is a crime that transcends national and jurisdictional boundaries. Victims and perpetrators of cyber-stalking may be geographically separated by physical borders (for example, residing in different countries) when the offences occur. This is problematic for investigating the crime, in determining the jurisdiction in which alleged offences have taken place and in which charges may be filed. Legal definitions of stalking (and cyber-stalking) and applicable sentences vary across jurisdictions, if indeed they exist, further muddying the water. This paper provides an overview of the current state of knowledge on cyber-stalking and ends with an examination of the difficulties in investigating and prosecuting cyber-stalkers. Keywords: Stalking; Cyber Stalking; Victims; Perpetrators; Introduction Cyber-crime is emerging as a major international criminological issue. Networked computers provide the media for new types (or variations on old types) of criminal activity to emerge. Cyber-stalking is one such crime enabled by the Internet.
    [Show full text]
  • The Federal Cyberstalking Statute, Content Discrimination and the First Amendment
    The Federal Cyberstalking Statute, Content Discrimination and the First Amendment James Weinstein* TABLE OF CONTENTS INTRODUCTION ................................................................................. 2555 I. THE CONTESTED SCOPE OF THE RULE AGAINST CONTENT DISCRIMINATION .................................................................... 2559 A. The All-Inclusive Approach v. The Democratic Self- Governance Model ........................................................... 2560 B. Criticism of the All-Inclusive Approach............................ 2566 II. THE FEDERAL CYBERSTALKING STATUTE AND THE ALL- INCLUSIVE APPROACH ............................................................. 2569 III. THE FEDERAL CYBERSTALKING STATUTE AND THE DEMOCRATIC SELF-GOVERNANCE MODEL .............................. 2577 A. An Elaboration and Defense of the Democratic Self- Governance Model ........................................................... 2577 B. The Democratic Self-Governance Model and § 2261A(2)(B) ................................................................ 2580 C. Section 2261A(2)(B) Caselaw ......................................... 2584 * Copyright © 2021 James Weinstein. Dan Cracchiolo Chair in Constitutional Law, Sandra Day O’Connor College of Law, Arizona State University. I am grateful to Arthur Hellman, Robert Post, and the participants in the online symposium on “Cheap Speech Twenty-Five Years Later: Democracy & Public Discourse in the Digital Age” for their helpful comments and suggestions, and to law students Emiley Pagrabs
    [Show full text]
  • I Facebook and Panopticism: Healthy Curiosity Or Stalking?
    Facebook and Panopticism: Healthy Curiosity or Stalking? A thesis presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Mary Catherine Kennedy November 2009 © 2009. Mary Catherine Kennedy. All Rights Reserved. i This thesis titled Facebook and Panopticism: Healthy Curiosity or Stalking? by MARY CATHERINE KENNEDY has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Karen E. Riggs Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT KENNEDY, MARY C., M.A., November 2009, Telecommunications Facebook and Panopticism: Healthy Curiosity or Stalking? (108 pp.) Director of Thesis: Karen E. Riggs This study deepens existing knowledge concerning social networking sites, with specific interest in the social networking site Facebook and the phenomenon, “Facebook stalking”. By providing insights into lesser-known studies concerning user curiosity and surveillance online, the present research reveals that the terms ‘monitoring’ and ‘keeping up with’ or ‘keeping in touch with’ are most commonly used when referring to social searches within social networks; only when asked to think about surveillance in terms of stalking did interview participants refer to it as such. The present study aims to discover Facebook users’ perception of their friends’ disclosure while delving into the idea of “Facebook stalking”, specifically with regard to how users define it. Facebook’s evolution and prominence in the public sphere is dependent upon user satisfaction with and general understanding of the functionality of social networking websites. A discussion of these issues is beneficial to understanding how Facebook is used as a modern-day panopticon.
    [Show full text]
  • June 10, 2021 President Joseph R. Biden the White House 1600
    June 10, 2021 President Joseph R. Biden The White House 1600 Pennsylvania Ave. NW Washington, DC 20500 Dear Mr. President: We, the undersigned civil rights, civil liberties, privacy, government accountability, and consumer rights organizations, urge your Administration to ensure that any new transatlantic data transfer deal is coupled with the enactment of U.S. laws that reform government surveillance practices and provide comprehensive privacy protections. The United States’ failure to ensure meaningful privacy protections for personal data is the reason that a growing number of countries are concerned about trans-border data flows. Until the United States addresses this problem, concerns about data transfers to the United States will remain, and data flow agreements are likely to be invalidated. Recent history demonstrates that any transatlantic data transfer agreement will be subject to litigation to determine whether it provides adequate protection for personal data. In 2015, the Court of Justice of the European Union invalidated the U.S.-EU Safe Harbor agreement. And in July 2020, the successor agreement, Privacy Shield, was also invalidated by the same court. Without reform of U.S. surveillance and privacy laws, any new transatlantic data transfer deal will likely face a similar fate. The only way to fully address these issues and enter into a lasting transatlantic agreement is to harmonize data protection standards between the European Union and the United States. There have been calls for the United States to strengthen and modernize its privacy laws since long before the European Union’s General Data Protection Regulation came into effect in 2018. The modern concept of the right to privacy was invented in the United States – but now we lag behind many other nations on privacy protections.
    [Show full text]
  • Survey on Privacy Preserving in Social Networks
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2015): 78.96 | Impact Factor (2015): 6.391 Survey on Privacy Preserving in Social Networks S. Mayil1, Dr. M. Vanitha2 1Research scholar, PG & Research Department of Computer Science, JJ College of Arts and Science (Autonomous), Pudukkottai, Tamil Nadu, India 2Assistant Professor, Ph.D. and Research Department of Computer Application, Alagappa University, Karaikudi , Tamilnadu. Abstract: The development of online social networks and the release of data network resulting in the risk of leakage of personal confidential information. This requires privacy protection before the data network is published by the service provider. Data privacy online social networks are important in recent years. Therefore, this research is still in its infancy. This article describes the generalization techniques of anonymous social networking data with sufficient privacy for harsh environments while preserving the validity of the data. The loss metric information, iloss, is used to check the information due to the loss of the generalized amount. While these networks make frequent data sharing and intercommunication between users can instantly and privacy problems that may arise are very explicable with their obvious immediate consequences. Although the concept of privacy can take different forms, the ultimate challenge is how to prevent the invasion of privacy when personal information is available. Basic social networks, co-statements, and their associated primary motivations. The following describes how to protect privacy, relying on technical analysis and link social networks to disclose sensitive user information. Keywords: Data Privacy, Data Publishing, Privacy Preserving, Social Network, Service Provider. 1. Introduction data may affect the privacy of individuals.
    [Show full text]
  • CJEU Ruling on Facebook Action on January 25, 2018: Class Action, Model Case Or No Jurisdiction?
    CJEU ruling on Facebook action on January 25, 2018: Class action, model case or no jurisdiction? In August 2014, lawyer and data protection expert Max Schrems filed a lawsuit against Facebook with his competent court in Vienna, as previous complaints in Ireland have not been decided by the Irish Data Protection Commissioner since 2011. Now the CJEU decides on the admissibility of the lawsuit against Facebook. Previously, in 2015 Schrems brought down the EU-US “Safe Harbor” system through a case against Facebook at the CJEU. Dispute solely on jurisdiction and on two questions Facebook has submitted various grounds with the court in Vienna, why the procedure should not be heard at all. The majority of these attempts to prevent the procedure have already been rejected by the Austria courts over the past three years. What remained, were two questions: (1) whether Mr Schrems is a "consumer" or has lost this status through his pro bono work as a privacy advocate; and (2) whether he can bring claims of other users jointly in a "class action". The class action is financed by ROLAND Prozessfinanz AG. Facebook wants each of the 25,000 other users to have to sue in a separate procedure - which would make the legal costs skyrocket and a case against Facebook financially impossible for most users. In Facebook’s view, the same legal and factual issues should therefore be trailed 25,000 times in front of thousands of European courts and judges (“divide and conquer”). These two questions were submitted to the Court of Justice of the European Union (CJEU) for a preliminary ruling by the Austrian Supreme Court.
    [Show full text]
  • Facebook: Where Privacy Concerns and Social Needs Collide
    Edith Cowan University Research Online Theses: Doctorates and Masters Theses 2020 Facebook: Where privacy concerns and social needs collide Sonya Scherini Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses Part of the Communication Technology and New Media Commons, Mass Communication Commons, and the Social Media Commons Recommended Citation Scherini, S. (2020). Facebook: Where privacy concerns and social needs collide. https://ro.ecu.edu.au/ theses/2331 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses/2331 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth). Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form.
    [Show full text]
  • A Collaborative Framework: for Privacy Protection in Online Social Networks
    A Collaborative Framework: for Privacy Protection in Online Social Networks 4 4 Yan Zhu1,2, Zexing Hu1, Huaixi Wang3, Hongxin Hu , Gail-Joon Ahn 1 Institute of Computer Science and Technology, Peking University, Beijing 100871, China 2Key Laboratory of Network and Software Security Assurance (Peking University), Ministry of Education, China 3School of Mathematical Sciences, Peking University, Beijing 100871, China, 4Laboratory of Security Engineering for Future Computing (SEFCOM), Arizona State University, Tempe, AZ 85287, USA Email: {yan.zhu.huzx.wanghx}@pku.edu.cn. {hxhu,gahn }@asu.edu Abstract-With the wide use of online social networks (OSNs) , Although some new techniques were introduced in these the problem of data privacy has attracted much attention. solutions, it is still necessary for a centralized server to Several approaches have been proposed to address this issue. enforce access control, which cannot protect the privacy of One of privacy management approaches for OSN leverages a key users against the centralized server. Also, some solutions management technique to enable a user to simply post encrypted contents so that only users who can satisfy the associate security implemented access control at client-side but their approach policy can derive the key to access the data. However, the key should be synchronous, requiring multiple users to be online management policies of existing schemes may grant access to simultaneously. unaurhorized users and cannot efficiently determine authorized One of efficient ways for enforcing access control in OSN users. In this paper, we propose a collaborative framework is to allow users to put the encrypted data on the server and which enforces access control for OSN through an innovative key management focused on communities.
    [Show full text]
  • A/74/130 General Assembly
    United Nations A/74/130 General Assembly Distr.: General 30 July 2019 Original: English Seventy-fourth session Item 109 of the provisional agenda* Countering the use of information and communications technologies for criminal purposes Countering the use of information and communications technologies for criminal purposes Report of the Secretary-General Summary The present report has been prepared pursuant to General Assembly resolution 73/187, entitled “Countering the use of information and communications technologies for criminal purposes”. In that resolution, the General Assembly requested the Secretary-General to seek the views of Member States on the challenges that they faced in countering the use of information and communications technologies for criminal purposes and to present a report based on those views for consideration by the General Assembly at its seventy-fourth session. The report contains information on the views of Member States submitted pursuant to the aforementioned resolution. __________________ * A/74/150. V.19-08182 (E) 190819 200819 *1908182* A/74/130 Contents Page I. Introduction ................................................................... 4 II. Replies received from Governments ............................................... 4 Argentina ..................................................................... 4 Armenia ...................................................................... 6 Australia ..................................................................... 8 Austria ......................................................................
    [Show full text]
  • Some Ethical Reflections on Cyberstalking Frances Grodzinsky Sacred Heart University, [email protected]
    Sacred Heart University DigitalCommons@SHU Computer Science & Information Technology Computer Science & Information Technology Faculty Publications 3-2002 Some Ethical Reflections on Cyberstalking Frances Grodzinsky Sacred Heart University, [email protected] Herman T. Tavani Rivier College Follow this and additional works at: http://digitalcommons.sacredheart.edu/computersci_fac Part of the Business Law, Public Responsibility, and Ethics Commons, Legal Ethics and Professional Responsibility Commons, and the Privacy Law Commons Recommended Citation Grodzinsky, Frances, Tavani, Herman T. "Some Ethical Reflections on Cyberstalking." ACM SIGCAS Computers and Society 32.1 (2002): 22-32. This Article is brought to you for free and open access by the Computer Science & Information Technology at DigitalCommons@SHU. It has been accepted for inclusion in Computer Science & Information Technology Faculty Publications by an authorized administrator of DigitalCommons@SHU. For more information, please contact [email protected]. Some Ethical Reflections on Cyberstalking Frances S. Grodzinsky Sacred Heart University has come to be associated with one individual ("the <grodzinskyf@sacredhearcedu> stalker ~) clandestinely tracking the movement and whereabouts of an another individual or individuals Herman T. Tavani ("the stalkee[s]~). Rivier College <[email protected]> Cyberstalking can be understood as a form of behav- ior in which certain types of stalking-related activi- ties, which in the past have occurred in physical space, Abstract are extended to the online world. On the one hand, The present study examines • range of moral issues asso- we do not wish to claim that cyberstalking is a new ciated with recent cyberstalking cases. Particular atten- kind of crime or that it is a "genuine computer crime" tion is centered on the Amy Boyer/Liam Youens case of (see Tavani, 2000).
    [Show full text]
  • Checkliste Datenverkehr Eu - Usa
    CHECKLISTE DATENVERKEHR EU - USA 1. Findet ein Datenverkehr mit den USA statt?1 ☐ Datenübermittlung in die USA an o Konzernunternehmen? o direkte Vertragspartner (laufende Projekte, Kooperationen etc)? ☐ Datenhosting in den USA? o Software-Hosting (z.B. HubSpot, Apple) o Clouds (z.B. Microsoft, Google, Amazon) o Mailings (z.B. Gmail, Mailchimp) ☐ Social Media Nutzung mit USA-Beteiligung? o Social Media Accounts (Facebook, Instagram, Twitter) o Social Media Fanpages o Social PlugIns 2. Ist das datenempfangende US Unternehmen ein „elektronischer Diensteanbieter“ wie in der beanstandeten Regelung des Section 702 Intelligence Surveillance Act (FISA) gefordert? ☐ Ja –> Weiter zu 3. ☐ Nein. 15.1. Werden sonstige Sicherheitsmaßnahmen vom US-Unternehmen getroffen, um etwaigen Datenzugriff Unberechtigter zu verhindern? ☐ Ich weiß es nicht. In diesem Fall können Sie einen Fragebogen (wie z.B. von NOYB) an das US Unternehmen schicken, um abzuklären, ob das Unternehmen unter die strengen Überwachungsgesetze der USA fällt, welche vom Europäischen Gerichtshof problematisch gesehen wurden. Das sind z.B.: - Telekommunikationsanbieter - Clouddiensteanbieter - Anbieter elektronischer Kommunikationsdienste - sonstige gesetzliche oder freiwillige Überwachungsmaßnahme von Seiten der US-Behörden, an denen das Unternehmen beteiligt ist? 3. Auf welcher Grundlage findet der Datentransfer statt? ☐ Privacy Shield –> Weiter zu 4. ☐ Standardvertragsklauseln (SCC) –> Weiter zu 5. ☐ Binding Corporate Rules (BRC) –> Weiter zu 6. ☐ genehmigte Vertragsklauseln –> Derzeit keine Änderung notwendig! ☐ ausdrückliche Einwilligung –> Prüfung von: 1 Falls auch nur ein Punkt bejaht wird –> Weiter zu 2. o Verträgen und Einwilligungserklärungen der Betroffenen, o Informationserteilung an Betroffene über Risiken in Drittland. -> Derzeit keine Änderung notwendig. ☐ Vertragserfüllung: o Verträge und AGB prüfen o Übermittlung ist für Vertragserfüllung zwischen der betroffenen Person und dem Verantwortlichen oder zur Durchführung von vorvertraglichen Maßnahmen auf Antrag der betroffenen Person erforderlich.
    [Show full text]