In the Lustrum Cyber Talk with our Chairman Jan De Blauwe, Marc Goodman looked back on the past five years' technology evolution through a unique wide-angle lens of cybercrime.
Are Cookie banners indeed compliant with the law? – Webinar 3 December 2020
3 December 2020 – Cyber Security Coalition
Compliant cookie banners mission impossible?
Those pesky cookies… and even worse, those pestiferous cookie banners. These banners keep popping up, asking for our consent time and again. And they are often in no way compliant with the GDPR, as Nataliia Bielova (Inria) and Cristiana Santos (Utrecht University) point out in this outstanding presentation, both from a legal and in-depth technical point of view. They formulated 22 low level legal/technical requirements to implement consent mechanisms in web applications, compliant with the requirements in GDPR and the ePrivacy Directive (do read their extensive article). In their talk they present a multitude of pitfalls, while indicating difficulties experienced when checking compliance.
Is compliance actually impossible? Bluntly, today it’s a tough challenge, though some pointers are provided regarding (future) solutions. At the very least, this session focuses your attention on many pitfalls, helping your (preferably multidisciplinary) approach to avoid them. As you should, because many GDPR court cases are the result of inadequate consent mechanisms. Do understand that invalid consent results in the interdiction of processing the data involved for the stated purposes, and will result in potentially heavy fines if processing continues.
Cookies are pesky, but the two sessions on cookies combined provide extremely helpful and needed insights in managing them in a compliant way. They’re a ‘must’.
Other blog posts
Cyber Talk: How to implement a Coordinated Vulnerability Disclosure Policy/Bug Bounty Programme for your organization? – 26 November 2020
This webinar helps you understand the key elements to implement a Coordinated Vulnerability Disclosure Policy supported by a bug bounty programme, whether you work for a corporation, nonprofit, open source project, or public entity.
Absence of evidence is not evidence of absence! This aphorism is more than ever valid in Cyber Security, people stating that they never had a breach probably simply do not know that they have been breached. This presentation given by Luk Schoonaert – Director of Technology @ Exclusive Networks, Value Add Distributor of Emerging Technologies […]
In this webinar Semetis demystified Internet cookies and provided clarity about their working. They also provided an insight into a future without (third party) cookies.
In this webinar Marc Wouters presents the NIS supervisory strategy for Digital Service Providers. The mission of the FPS Economy is to create the conditions for a competitive, sustainable and balanced operation of the goods and services market in Belgium.