Managing mailboxes after termination: do’s and don’ts under the GDPR
Table of Contents When an employment relationship ends, there are many tasks to handle, ranging from administrative duties to ensuring privacy and […]
NIS2 compliance? eIDAS 2.0 delivers the building blocks for stronger digital security.
Key takeaways eIDAS 2.0 goes beyond identity. Through trust services such as qualified electronic signatures, timestamps, and archiving, eIDAS 2.0 secures data […]
What is the impact of the Cyber Resilience Act on your contracts and processes?
Key Takeaways The CRA has important consequences for products with digital elements (PDEs). PDEs can no longer simply be placed on the […]
Can you reject a GDPR access request? Prove it!
Case C-526/24 Brillen Rottler discusses a hot topic in privacy land (especially if you are following the Digital Omnibus package), namely when […]
What are the model contractual terms and standard contractual clauses under the Data Act?
The implementation of the Data Act has contractual consequences for organisations that fall within its scope. This means that organisations should review […]
The Cyber Resilience Act (CRA) in 10 questions and answers
Table of Contents While the NIS2 Directive requires essential and important entities to achieve a certain level of cybersecurity at organisational level, […]
Can patient data be used to train AI?
Legal and privacy considerations in healthcare Key Takeaways The reuse of patient data for training an AI model is possible, but requires […]
How the Belgian DPA will enforce the GDPR differently in 2026–2028
The Belgian Data Protection Authority (GBA/APD) has published its new strategic plan for 2026–2028. Normally the DPA works with six-year plans, but […]
What is (in)direct data collection under the GDPR
Follow this train of thought: you take public transport and all goes well. A ticket inspector joins your carriage to verify the […]
The legal analysis of NIS2: what you need to know before you start
Table of Contents Key takeaways Always start with a legal analysis for NIS2. The classification as an essential or important entity determines […]
CISO & DPO: Better together?
How stronger CISO-DPO collaboration improves compliance, risk, and resilience The DPO (Data Protection Officer) and the CISO (Chief Information Security Officer) are […]
How to launch a high-risk AI system under the AI Act
It’s finally here, you have built your state-of-the-art AI system which is exactly what the market and your customers need: a CV […]