facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

E.U.’s GDPR Setting a Precedent for Data Privacy

E.U.’s GDPR Setting a Precedent for Data Privacy

Legislation to protect the data of users is nothing new, but it has entered a new stage--one where the user has more control over their privacy than ever before. We’re talking, of course, about the General Data Protection Regulation, or GDPR, which has sparked a lot of discussion about how companies collect and protect data by its users. In fact, more data privacy regulations have begun to spring up here and there in response to the affect GDPR has had on the industry.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration IT Support VoIP IT Support Smartphones Data Backup Quick Tips Network communications Mobile Devices Business Continuity Microsoft Office Gadgets Data Recovery Cybersecurity Disaster Recovery Android Social Media Upgrade Mobile Office Server Communication Virtualization Smartphone Phishing Mobile Device Management Miscellaneous Ransomware Holiday Vendor Management Passwords Windows 10 Outsourced IT Operating System Tech Term Managed IT Services Windows Apps Internet of Things Facebook Remote Monitoring Users Unified Threat Management Mobile Device BDR Automation Analytics BYOD Mobile Computing Data Management Remote Computing Apple Managed IT services Windows 10 WiFi Training Artificial Intelligence Marketing History Cloud Computing The Internet of Things Browser Save Money Firewall Help Desk Alert Business Technology Big data App Spam Encryption Office Bandwidth Office 365 Information Technology Health Two-factor Authentication IT Consultant Government Access Control Bring Your Own Device Cybercrime Windows 7 Antivirus Maintenance Managed IT Printer Content Filtering Budget Hard Drives Going Green Gmail Computers Saving Time Recovery Information VPN Employer-Employee Relationship Retail Wireless Technology Healthcare Windows 8 Outlook Search Cost Management Tech Support Managed Service Virus Lithium-ion Battery Best Practice Hiring/Firing Augmented Reality Travel Education It Management Computing Update Hacking Blockchain Data Loss Humor iPhone Money Document Management Project Management Customer Service Remote Work IBM Phone System Networking Current Events Covid-19 Storage Website PowerPoint Regulations Twitter Intranet Voice over Internet Protocol Data Security Administration File Sharing SaaS Value Password Hard Drive Patch Management Risk Management Law Enforcement Hacker Mobility Avoiding Downtime Applications Solid State Drive Save Time Compliance Data Breach Vendor Downtime Data storage Flexibility Conferencing Computer Repair Running Cable Proactive IT Wireless Customer Relationship Management Legal Telephone Systems Software as a Service Management Paperless Office Word Vulnerabilities Sports Disaster Hosted Solution Fax Server End of Support Cortana Robot Google Maps Securty Net Neutrality Scam Business Intelligence Social Engineering Cooperation Digital Payment Router Black Market User Meetings Comparison Tablet Cryptocurrency Virtual Desktop Digital Private Cloud Social Wi-Fi Company Culture Laptop Websites Excel Monitoring Business Growth Telephony Social Networking DDoS Machine Learning Distributed Denial of Service Programming Office Tips Statistics Uninterrupted Power Supply Integration Co-managed IT Gaming Console Network Congestion Multi-factor Authentication User Error YouTube Public Cloud Licensing Telephone Vulnerability Unified Communications Settings Text Messaging Bitcoin Webcam Identity Theft Data Protection Streaming Media Managed Services Provider eWaste Lifestyle Downloads How To Smart Devices Virtual Reality Employee/Employer Relationship Politics Managed Services IT service Emails Managed IT Service Inbound Marketing Chrome Processors Automobile USB Chromebook Distribution Redundancy Computing Infrastructure Hack Presentation Bluetooth Pain Points Evernote Processor Computer Accessories How To Download Specifications Safety Cost Virtual Assistant Google Docs Trending Memory Start Menu Tech Terms Solutions Experience Mouse Documents Cleaning Teamwork Heating/Cooling Microchip Taxes Mobile Technology Monitors Entertainment Professional Services Flash email scam Addiction Computer Care SQL Server CIO Reading Samsung Accountants A.I. Microsoft Excel GDPR Managing Risk Memes Saving ZTime Advertising G Suite Managing IT Services Point of Contact Staffing Google Wallet Employer Employee Relationship Google Drive Windows Server 2008 Tech Hypervisor Windows XP PDF Webinar Holidays Surveillance Harddrive Society Best Available Keyboard Hacks Physical Security Migration Connected Devices Spyware Mobile Payment Fileless Malware Hybrid Cloud Telework Debate Displays Wireless Headphones Banking Botnet Network Management Electricity Printing Proxy Server Azure Remote Workers GPS Micrsooft Domains Relocation Tablets Equifax Fleet Tracking Modem Strategy IT Sync Electronic Medical Records Transportation Virtual Private Network Analytic Drones Public Speaking Device security MSP Term External Harddrive Recycling Recording Optimization Development Product Reviews Shortcut Notifications CCTV Desktop Finance cache Television Directions Display Nanotechnology Social Network Permissions Language Entrepreneur Business Metrics Computer Malfunction Business Cards Service Level Agreement WannaCry Dark Web Free Resource Data Storage 3D Ebay Read Troubleshooting Reliable Computing Startup Asset Tracking SSID Thin CLient In Internet of Things Unified Threat Management Backup and Disaster Recovery Corporate Profile Health IT Procurement HIPAA Username Time Management Freedom of Information Processing Best Practives Smart Phones Environment Logistics Virtual Machines Video Conferencing Music Competition Gamification Assessment SharePoint Wasting Time Device Management switches Writing Electronic Payment Screen Reader Customer Resource management Leadership Business Managemenet Motion Sickness Piracy Upload Google Calendar Bookmark Microserver PCI DSS Adminstration Content Management Pirating Information Upgrades Business Owner Scalability Smart Tech Tip of the week Cyber security Communitications Fiber-Optic Database VoIP Employer/Employee Relationships Supply Chain Management IP Address Messenger Tracking HTML Touchscreen News Google Play Telephone Service LiFi Telephone System Knowledge Microsoft 365 Internet Service Provider Application Rental Service Mobile Security Consultation Get More Done Managing Costs online Currency Human Resources Work/Life Balance Web Server Software License Trends Technology Tips Browsers Turn Key Regulations Compliance Deep Learning Cabling Multi-Factor Security Medical IT Printer Server Trend Micro IT Assessment Administrator Fraud Tactics Audit User Tip Proactive Maintenance Remote Working Books Workers Devices Fake News Security Cameras Trojan Threats LinkedIn Visible Light Communication Organize Upselling Digital Signature Supercomputer UTM Content Data Warehousing Navigation Virtual Machine IT consulting Electronic Health Records Skype IT Plan Enterprise Resource Planning Access Data Analysis Employees Financial Data Archive Video Surveillance Worker Legislation Error Emergency Hard Drive Disposal eCommerce Productuvuty Printers FinTech CrashOverride Personal Information Managing Stress Financial Capital Regulation 3D Printing