{"id":1995,"date":"2024-07-03T12:28:59","date_gmt":"2024-07-03T10:28:59","guid":{"rendered":"https:\/\/blog.eprivacy.eu\/?p=1995"},"modified":"2024-07-03T12:37:43","modified_gmt":"2024-07-03T10:37:43","slug":"datenschutzzertifikate-nach-art-42-dsgvo-die-aufzeichnung","status":"publish","type":"post","link":"https:\/\/blog.eprivacy.eu\/?p=1995&lang=de","title":{"rendered":"Datenschutzzertifikate nach Art. 42 DSGVO: Die Aufzeichnung"},"content":{"rendered":"\n<figure class=\"wp-block-image\" id=\"block-1147ab84-e73e-4668-8c08-4105d59681ba\"><img src=\"https:\/\/blog.eprivacy.eu\/wp-content\/uploads\/2024\/06\/DS-am-Mittag-SoMe-mT_2024-07-02-2.png\" alt=\"Dieses Bild hat ein leeres Alt-Attribut. Der Dateiname ist DS-am-Mittag-SoMe-mT_2024-07-02-2.png\"\/><\/figure>\n\n\n\n<p id=\"block-0a836279-4a05-4abb-bd75-a1b28dc2e2f9\"><meta charset=\"utf-8\">Der Vortrag hat einen \u00dcberblick \u00fcber den aktuellen Stand der Datenschutz-Zertifikate nach Art. 42 DSGVO gegeben. Professor Bauer hat Anforderungen an und Funktionsweisen von Datenschutz-Zertifikaten vorgestellt, Vor- und Nachteile diskutiert und m\u00f6gliche Alternativen vorgestellt. Die Aufzeichnung und die Pr\u00e4sentation finden Sie \u00fcber folgende Links:<\/p>\n\n\n\n<p><a href=\"https:\/\/stiftungdatenschutz.org\/veranstaltungen\/unsere-veranstaltungen-detailansicht\/datenschutzzertifikate-nach-artikel-42-dsgvo-495\">Aufzeichnung<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/blog.eprivacy.eu\/wp-content\/uploads\/2024\/07\/20240702-Zertifizierungen-nach-Art.-42-DSGVO-final_compressed.pdf\">P<\/a><a href=\"http:\/\/blog.eprivacy.eu\/wp-content\/uploads\/2024\/07\/20240702-Zertifizierungen-nach-Art.-42-DSGVO.pdf\">r\u00e4sentation<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Der Vortrag hat einen \u00dcberblick \u00fcber den aktuellen Stand der Datenschutz-Zertifikate nach Art. 42 DSGVO gegeben. Professor Bauer hat Anforderungen an und<\/p>\n<p class=\"link-more\"><a class=\"myButt \" href=\"https:\/\/blog.eprivacy.eu\/?p=1995&#038;lang=de\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":1971,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[29],"tags":[],"_links":{"self":[{"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=\/wp\/v2\/posts\/1995"}],"collection":[{"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1995"}],"version-history":[{"count":4,"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=\/wp\/v2\/posts\/1995\/revisions"}],"predecessor-version":[{"id":2002,"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=\/wp\/v2\/posts\/1995\/revisions\/2002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=\/wp\/v2\/media\/1971"}],"wp:attachment":[{"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eprivacy.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}