{"id":2633,"date":"2021-10-21T16:28:45","date_gmt":"2021-10-21T14:28:45","guid":{"rendered":"https:\/\/ur4-tia.com\/cyber-security\/data-protection-and-data-security\/"},"modified":"2022-03-02T15:55:52","modified_gmt":"2022-03-02T14:55:52","slug":"data-protection-and-data-security","status":"publish","type":"page","link":"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/data-protection-and-data-security\/","title":{"rendered":"Data Protection and Data Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2633\" class=\"elementor elementor-2633 elementor-379\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c61ab45 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c61ab45\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;a857a94&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3734f7c\" data-id=\"3734f7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-532cea0 elementor-widget elementor-widget-heading\" data-id=\"532cea0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Data Protection?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebb8363 elementor-widget elementor-widget-text-editor\" data-id=\"ebb8363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Data protection<\/strong>\u00a0has regained more space in the public discussion thanks to the European General Data Protection Regulation.\u00a0Data protection is primarily about regulating the appropriate handling of personal data.\r\n\r\nSeveral generations of laws, specifications and regulations at national and international level have established certain basic concepts that describe various aspects of this task.\u00a0Specifically, this is about\r\n<ul>\r\n \t<li>protection of the right to informational self-determination,<\/li>\r\n \t<li>protection of personal rights in data processing,<\/li>\r\n \t<li>protection of privacy,<\/li>\r\n \t<li>Protection against improper data processing.<\/li>\r\n<\/ul>\r\nUltimately, these are different perspectives on THE central goal: the right of the individual to decide who should have access to which of their personal data and when, in order to be better able to protect themselves against operational, state or other surveillance and profiling.\r\n\r\nData protection: a single person decides (often with a click or signature) whether, and if so which, of their data is passed on to a requesting organization, what it may be used for, and is given the right to information, deletion, etc.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3184334 elementor-widget elementor-widget-heading\" data-id=\"3184334\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Data Security?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57d4389 elementor-widget elementor-widget-text-editor\" data-id=\"57d4389\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Data security<\/strong>\u00a0has overlaps but also clear\u00a0<strong>differences with data protection<\/strong>.\u00a0Nowadays, the main technical goal of data security is to adequately protect data of any kind against loss, manipulation, unauthorized access by third parties and other threats.\u00a0Data security can be achieved by suitable technical and organizational means (\u201cTOMs\u201d), which have already been defined in the data protection environment, and vice versa.\r\n\r\nLike information security and other related disciplines, the protection goals of data security include confidentiality, integrity and availability. In general, the operative fields of activity are largely drawn from the same laws, ordinances and guidelines. In the area of \u200b\u200bdata security, there is a greater focus on the entirety of company-sensitive and critical data that serve as a basis for making decisions.\r\n\r\nData security incidents &#8211; in the sense of unintentionally manipulated or leaked data &#8211; are therefore less to be found in a legal penalty dimension, but rather with the weakening of the company&#8217;s own decision-making authority through an incorrect database and\/or information outflow to the competition (in the sense of industrial espionage), in the market (above all in terms of image loss) or to governmental bodies.\r\n\r\n<strong>Data security also needs<\/strong>\u00a0to be distinguished\u00a0from data security,\u00a0which tends to be assigned to the area of \u200b\u200bavailability and disaster prevention.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-115f350 elementor-widget elementor-widget-heading\" data-id=\"115f350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Difference between privacy and data security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7a883f elementor-widget elementor-widget-text-editor\" data-id=\"b7a883f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tData protection focuses primarily on personal data itself: what rights individuals have (request for information, request for deletion, etc.), what obligations organizations have (collection, processing, active deletion, etc.).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12959f5 elementor-widget elementor-widget-text-editor\" data-id=\"12959f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2557\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/12\/4.svg\" alt=\"\" width=\"600\" height=\"600\" \/>\r\n\r\nFigure 1: Data protection vs. data security\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24d25a3 elementor-widget elementor-widget-text-editor\" data-id=\"24d25a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tData security, on the other hand, focuses primarily on the correctness and integrity of personal and business-critical data that serve as the basis for business decisions.\u00a0Data security thus covers large areas of the technical implementation of data protection but goes beyond purely personal data in the data objects considered.\r\n\r\nAdequate data security is a central requirement for effective data protection.\r\n\r\nWhat both have in common, however, is the requirement to handle data appropriately to maintain the similar but differently valued protection goals of both disciplines.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25ed5c2 elementor-widget elementor-widget-heading\" data-id=\"25ed5c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rules on data protection and data security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9e587f elementor-widget elementor-widget-text-editor\" data-id=\"b9e587f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn most cases, you can&#8217;t have one without the other.\u00a0<strong>Data protection and data security<\/strong>\u00a0are almost inextricably linked and are not only based on the same legal requirements.\r\n\r\nData protection defines the following basic rules, especially for data collection and processing:\r\n<ul>\r\n \t<li>Direct collection: Data may only be collected directly from the person involved.<\/li>\r\n \t<li>Consent to data collection: This must actively consent to data collection.<\/li>\r\n \t<li>Purpose limitation: the respective purpose of use must be clearly stated in the consent<\/li>\r\n \t<li>Data avoidance and data economy: any data NOT necessary for the purpose of use must NOT be collected and stored<\/li>\r\n \t<li>Rights of data subjects: Since the GDPR came into force, every individual also has significantly more comprehensive rights in relation to their data collected by an organization.<\/li>\r\n<\/ul>\r\nDisregarding these rules can result in severe penalties.\u00a0Especially if it is not just about personal data, but specifically about content that is particularly worthy of protection.\r\n\r\nIt makes more sense for organizations not only to think about backup mechanisms in the context of data security, but also to really actively invest in software, hardware, processes and advice that support the fulfillment of data protection requirements in the best possible way.\r\n\r\nIn concrete terms, this means for data protection and data security: planning and implementing hardware, software and processes from the outset according to data security aspects, and above all regularly checking and testing them.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7432a39 elementor-widget elementor-widget-heading\" data-id=\"7432a39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data protection and data security in the legal books<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dabe1d3 elementor-widget elementor-widget-text-editor\" data-id=\"dabe1d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe basis for data protection and data security are above all the\u00a0<strong>following (German) laws<\/strong>, which are to be consulted for the definition and handling of data objects worthy of protection and the associated processes:\r\n<ul>\r\n \t<li><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=en&amp;client=webapp&amp;u=https:\/\/www.gesetze-im-internet.de\/bdsg_2018\/\" target=\"_blank\" rel=\"noopener\">Federal Data Protection Act<\/a><\/li>\r\n \t<li><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=en&amp;client=webapp&amp;u=https:\/\/www.gesetze-im-internet.de\/tmg\/\" target=\"_blank\" rel=\"noopener\">Telemedia Act<\/a><\/li>\r\n \t<li><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=en&amp;client=webapp&amp;u=https:\/\/www.gesetze-im-internet.de\/tkg_2021\/\" target=\"_blank\" rel=\"noopener\">Telecommunications Act<\/a><\/li>\r\n \t<li><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=en&amp;client=webapp&amp;u=https:\/\/www.bsi.bund.de\/DE\/Das-BSI\/Auftrag\/Gesetze-und-Verordnungen\/IT-SiG\/2-0\/it_sig-2-0_node.html\" target=\"_blank\" rel=\"noopener\">IT Security Act<\/a><\/li>\r\n \t<li><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=en&amp;client=webapp&amp;u=https:\/\/www.bsi.bund.de\/DE\/Das-BSI\/Auftrag\/Gesetze-und-Verordnungen\/gesetze-und-verordnungen_node.html\" target=\"_blank\" rel=\"noopener\">BSI regulations<\/a><\/li>\r\n \t<li><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=en&amp;client=webapp&amp;u=https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/?uri%3DCELEX:32016L0680\" target=\"_blank\" rel=\"noopener\">European General Data Protection Regulation (GDPR)<\/a><\/li>\r\n<\/ul>\r\nThe\u00a0<strong>GDPR<\/strong>\u00a0in particular has caused a stir and even more project activities in companies in recent years, as it sees many topics that were previously treated as individual aspects in a holistic context and, above all, the original owners of the data &#8211; i.e. the individuals &#8211; in their rights enormously strengthened.\r\n\r\nSince the GDPR came into force, penalties for enforcing or disregarding data protection have increased, depending on the severity and scope of the misconduct, up to the tens of millions of euros, which has meanwhile also made companies from less restrictive regions of the world aware of European data protection.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a535af0 elementor-widget elementor-widget-heading\" data-id=\"a535af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementation of data protection and data security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fab3def elementor-widget elementor-widget-text-editor\" data-id=\"fab3def\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs a management and process competence, the Information Security Management System (ISMS) for the implementation of data protection and data security is at the top of the list of priorities, and in many companies, it is based on common ISO standards.\r\n\r\nAlso included is the definition of clear roles and responsibilities as well as the mapping of all objects and processes that have historically developed around data worthy of protection or that are to be updated within the framework of corresponding project activities.\r\n\r\nThis includes:\r\n<ul>\r\n \t<li>Structure of the ISMS mentioned with feedback mechanisms and continuous improvement<\/li>\r\n \t<li>Appointment of internal or external data protection officers with a clear role description<\/li>\r\n \t<li>Planning, implementation, and documentation of internal and external audits<\/li>\r\n \t<li>Process, application, and data models, with a focus on personal and other critical data<\/li>\r\n \t<li>Processes and tools for manual and automated test routines,<\/li>\r\n \t<li>Raising employee awareness through training and information<\/li>\r\n<\/ul>\r\nIn the area of \u200b\u200bdata security, the main technical measures can be found:\r\n<ul>\r\n \t<li>technical protective measures of any kind to harden or react to internal and external, provoked, but also to unwanted incidents,<\/li>\r\n \t<li>Development of availability and disaster recovery technologies,<\/li>\r\n \t<li>Data reduction, data anonymization, data masking,<\/li>\r\n \t<li>Regular tests including documentation of relevant incident scenarios<\/li>\r\n<\/ul>\r\nWith the complexity shown, many companies find it difficult to keep sufficient competence available.\u00a0In the meantime, this has led to many external data protection officers, for example, who, as proven experts, can also evaluate and process special cases from different perspectives.\r\n\r\nThe BSI also recently reported the increased training and certification of company-independent incident experts, who can be consulted for proactive advice as well as in the event of an emergency.\r\n\r\nSeveral software and service companies have also specialized in offering solutions and services in infrastructure and in complex application environments that take the complexity out of information security in general, data protection and data security. Especially in the context of highly complex SAP environments with thousands of active interfaces, vast numbers of development projects with internal and external developers and the most varied release and transport statuses based on them, there is an unbroken need for specialists who can use structured tools and methods to eliminate weak points, as the consultants from the Firnkorn and Stortz with the in-house standard tools as well as advice and support along the best practices of data protection and data security, but above all relevant customer experience have already proven umpteen times.\r\n\r\nFinally, such instances also contribute to the significant improvement of data protection and data security, which massively challenge exactly these \u2013 albeit in the name of the commissioning organization: penetration testers and ethical \/ white hat hackers.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a91d6d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a91d6d2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;6dfe797&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf855b0\" data-id=\"cf855b0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c72d6d4 no-index elementor-widget elementor-widget-heading\" data-id=\"c72d6d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Also, read more on related topics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cc0a67 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2cc0a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/information-security\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Information Security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/it-security-concept\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">IT security concept<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/fail-safe\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fail-safe<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/high-availability-definition-classes-and-implementation\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">High availability<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26da4eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26da4eb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9316129&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-71fd324\" data-id=\"71fd324\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4fde72 elementor-widget elementor-widget-heading\" data-id=\"c4fde72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your contact at Firnkorn &amp; Stortz on the subject of data protection and data security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddf434d elementor-widget elementor-widget-template\" data-id=\"ddf434d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"2670\" class=\"elementor elementor-2670 elementor-802 elementor-802\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c315173 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c315173\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;8d63371&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d5c2653\" data-id=\"d5c2653\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2991e4e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2991e4e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c890c66&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-292ce79\" data-id=\"292ce79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-781dd28 elementor-widget elementor-widget-image\" data-id=\"781dd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"933\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-878x1024.jpg\" class=\"attachment-large size-large wp-image-2496\" alt=\"\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-878x1024.jpg 878w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-257x300.jpg 257w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-768x895.jpg 768w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-1318x1536.jpg 1318w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-1757x2048.jpg 1757w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a2a2ca8\" data-id=\"a2a2ca8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fcd87a2 elementor-widget elementor-widget-heading\" data-id=\"6fcd87a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Firnkorn + Stortz GmbH<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7488ebdd elementor-widget elementor-widget-heading\" data-id=\"7488ebdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Thomas Firnkorn<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-576c9278 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"576c9278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+4963239819011\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-phone\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+49 6323 9819011<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+4915146736468\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-mobile-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+49 151 46736468<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:thomas.firnkorn@ur4-tia.com\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-at\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">thomas.firnkorn@ur4-tia.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Data Protection? Data protection\u00a0has regained more space in the public discussion thanks to the European General Data Protection Regulation.\u00a0Data protection is primarily about regulating the appropriate handling of personal data. Several generations of laws, specifications and regulations at national and international level have established certain basic concepts that describe various aspects of this [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2629,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2633","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/comments?post=2633"}],"version-history":[{"count":5,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2633\/revisions"}],"predecessor-version":[{"id":2738,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2633\/revisions\/2738"}],"up":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2629"}],"wp:attachment":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/media?parent=2633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}