Data Protection Commission Ireland(@DPCIreland) 's Twitter Profileg
Data Protection Commission Ireland

@DPCIreland

Ireland's independent supervisory authority for data protection.
Social Media Policy: https://t.co/nq1YpLUrPP
Queries/Complaints: https://t.co/UEm6PpbEzp

ID:786180288900542464

linkhttp://www.dataprotection.ie calendar_today12-10-2016 12:22:42

3,7K Tweets

17,8K Followers

914 Following

Follow People
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

What are the principles of data security under the GDPR?

The Law - There is an obligation on organisations to implement appropriate technical and organisational measures to ensure a security level appropriate to the risk.

Learn about Data Security here: dataprotection.ie/en/organisatio…

What are the principles of data security under the GDPR? The Law - There is an obligation on organisations to implement appropriate technical and organisational measures to ensure a security level appropriate to the risk. Learn about Data Security here: dataprotection.ie/en/organisatio…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

In this blog, we look at some of the common data protection breaches around email correspondence, and how these breaches can be avoided. To find out more, go to: dataprotection.ie/index.php/en/d…

In this blog, we look at some of the common data protection breaches around email correspondence, and how these breaches can be avoided. To find out more, go to: dataprotection.ie/index.php/en/d…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

📚 Case Study
The complainant in this case was a borrower from a credit union. The credit union disclosed the name, address, family and employment status of the complainant to a private investigations firm in order to contact them re arrears on a loan.

👉 dataprotection.ie/en/dpc-guidanc…

📚 Case Study The complainant in this case was a borrower from a credit union. The credit union disclosed the name, address, family and employment status of the complainant to a private investigations firm in order to contact them re arrears on a loan. 👉 dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Guidance on the use of Drones - These guidelines have been developed for drone operators for purposes other than public law-related purposes and also to answer queries from the perspective of data subjects. dataprotection.ie/en/dpc-guidanc…

Guidance on the use of Drones - These guidelines have been developed for drone operators for purposes other than public law-related purposes and also to answer queries from the perspective of data subjects. dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

🎧 In this podcast, DPC Head of Communications Graham Doyle looks at contacting organisations on behalf of someone else and the issues that you can run into if you are not the account holder.

Listen here 👉dataprotection.ie/en/dpc-guidanc…

🎧 In this podcast, DPC Head of Communications Graham Doyle looks at contacting organisations on behalf of someone else and the issues that you can run into if you are not the account holder. Listen here 👉dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

What are the principles of data security under the GDPR?

The increasing amounts of personal data processed and held gives rise to security challenges for the organisations that collect that data.

Read our guide on Data Security here: dataprotection.ie/en/organisatio…

What are the principles of data security under the GDPR? The increasing amounts of personal data processed and held gives rise to security challenges for the organisations that collect that data. Read our guide on Data Security here: dataprotection.ie/en/organisatio…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

The DPC considers it important to highlight distinctions between access requests and discovery in civil litigation relating to CCTV. For more information on CCTV, Discovery and Access Requests, read our blog: dataprotection.ie/index.php/en/d…

The DPC considers it important to highlight distinctions between access requests and discovery in civil litigation relating to CCTV. For more information on CCTV, Discovery and Access Requests, read our blog: dataprotection.ie/index.php/en/d…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Case Study 🔍
The complainant in this case was an employee who maintained that their employer had infringed their data protection rights by searching for, retrieving and reviewing a number of emails on their corporate account.

👉 dataprotection.ie/en/dpc-guidanc…

Case Study 🔍 The complainant in this case was an employee who maintained that their employer had infringed their data protection rights by searching for, retrieving and reviewing a number of emails on their corporate account. 👉 dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

✅ New Decision added to our website
On 31 January 2024, the DPC adopted a decision following an inquiry concerning a complaint received against Airbnb Ireland UC. A summary of the inquiry and the full decision are available on our website: dataprotection.ie/en/dpc-guidanc…

✅ New Decision added to our website On 31 January 2024, the DPC adopted a decision following an inquiry concerning a complaint received against Airbnb Ireland UC. A summary of the inquiry and the full decision are available on our website: dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Link manipulation is a technical deception designed to make a link in an electronic communication look like it belongs to a trusted source. Read our tips on spotting phishing or social engineering attacks here: dataprotection.ie/en/dpc-guidanc…

Link manipulation is a technical deception designed to make a link in an electronic communication look like it belongs to a trusted source. Read our tips on spotting phishing or social engineering attacks here: dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

The GDPR does not prevent organisations dealing with somebody representing the account holder and should not be used as a barrier to services and to discriminate against people on the basis of their disability.

Read our blog post 👇
dataprotection.ie/en/dpc-guidanc…

The GDPR does not prevent organisations dealing with somebody representing the account holder and should not be used as a barrier to services and to discriminate against people on the basis of their disability. Read our blog post 👇 dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Case Study 🧐
This complaint was from the parent of a child whose health data was mistakenly disclosed to an unknown third party. The data was contained in a document attached to a misaddressed email that had been sent by an employee of a public body.

👉 dataprotection.ie/en/dpc-guidanc…

Case Study 🧐 This complaint was from the parent of a child whose health data was mistakenly disclosed to an unknown third party. The data was contained in a document attached to a misaddressed email that had been sent by an employee of a public body. 👉 dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

This guidance is intended to assist people in understanding what their rights are in relation to the processing of their personal data by CCTV and what they can expect from data controllers who use CCTV systems. dataprotection.ie/en/dpc-guidanc…

This guidance is intended to assist people in understanding what their rights are in relation to the processing of their personal data by CCTV and what they can expect from data controllers who use CCTV systems. dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

When does the right to be informed apply? Listen to our podcast to find out this and more on the right to be informed under the dataprotection.ie/en/dpc-guidanc…

When does the right to be informed apply? Listen to our podcast to find out this and more on the right to be informed under the #GDPR dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

What are the principles of data security under the GDPR?

Firewalls - A key weapon in combating unauthorised access attempts and absolutely essential where there is any external connectivity to other networks or to the internet.

Learn about Data Security: dataprotection.ie/en/organisatio…

What are the principles of data security under the GDPR? Firewalls - A key weapon in combating unauthorised access attempts and absolutely essential where there is any external connectivity to other networks or to the internet. Learn about Data Security: dataprotection.ie/en/organisatio…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

In most cases, the simplest thing to do is to delete the phishing email or text message. Before doing so, check if your email software or phone allows you to flag the message as ‘spam’ so that you do not continue to receive repeated messages. Go to: dataprotection.ie/index.php/en/d…

In most cases, the simplest thing to do is to delete the phishing email or text message. Before doing so, check if your email software or phone allows you to flag the message as ‘spam’ so that you do not continue to receive repeated messages. Go to: dataprotection.ie/index.php/en/d…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Case Study 📚
After an unsuccessful application for a credit card, a data subject submitted an erasure request which was refused by the controller. The data subject raised concerns with the DPC that their personal data was being unlawfully retained.

👉 dataprotection.ie/en/dpc-guidanc…

Case Study 📚 After an unsuccessful application for a credit card, a data subject submitted an erasure request which was refused by the controller. The data subject raised concerns with the DPC that their personal data was being unlawfully retained. 👉 dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Case Study 📚
After an unsuccessful application for a credit card, a data subject submitted an erasure request which was refused by the controller. The data subject raised concerns with the DPC that their personal data was being unlawfully retained.

👉 dataprotection.ie/en/dpc-guidanc…

Case Study 📚 After an unsuccessful application for a credit card, a data subject submitted an erasure request which was refused by the controller. The data subject raised concerns with the DPC that their personal data was being unlawfully retained. 👉 dataprotection.ie/en/dpc-guidanc…
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Our forms website will be offline today Wednesday 20 March, from 3pm-4pm. You can still contact us by emailing [email protected]. Organisations can submit a breach report once the forms are back online. Urgent breach queries can be sent to [email protected]

Our forms website will be offline today Wednesday 20 March, from 3pm-4pm. You can still contact us by emailing info@dataprotection.ie. Organisations can submit a breach report once the forms are back online. Urgent breach queries can be sent to breaches@dataprotection.ie
account_circle
Data Protection Commission Ireland(@DPCIreland) 's Twitter Profile Photo

Email spoofing involves an attacker sending messages with a forged sender address, to mislead the recipient about the origin of a message. Read our tips on spotting phishing or social engineering attacks here:

dataprotection.ie/en/dpc-guidanc…

Email spoofing involves an attacker sending messages with a forged sender address, to mislead the recipient about the origin of a message. Read our tips on spotting phishing or social engineering attacks here: dataprotection.ie/en/dpc-guidanc…
account_circle