According the Criminal Yearbook of 1990, the Court’s judgment in Brogan and others (EHRC 29 November 1988, A. 145-b) was very important for the development of the Dutch Criminal Law. As a result of this famous judgment, the Netherlands Minister of Justice
MoreThe principles are set in article 5 of the General Data Protection Regulation (GDPR) and enshrined thorough all the Regulation, and they apply to every personal data processing activity. As the cornerstone of the Regulation, they should be kept in mind when
MoreThe data processor (DP) is an entity that processes personal data for the account, on instruction and under the authority of the Data Controller (DC)-other than the employee of the DC. This enity can be a natural or legal person, public authority,
MoreThe Data Controller (“DC”) is the person who, alone or jointly, determines the purpose and means of the processing of personal data; in other words, is the person who decides why other’s personal data is processed and how it would be processed.
MoreThe Data Controller (“DC”) is the person who, alone or jointly, determines the purpose and means of the processing of personal data; in other words, is the person who decides why other’s personal data is processed and how it would be processed.
MorePrivate Automatic Branch Exchange Fraud
A substantial increase in your telephone bill is an indication your company could be the victim of Private Automatic Branch Exchange (PABX) fraud. Detailed billing will assist in identifying any potential unauthorised calls, usually International calls but they can also be National
MoreComputer Software Service Fraud (CSSF)
Fraud perpetrators may cold call you claiming there are problems with your computer and they can help you to solve them. Those fraud perpetrators often use the names of well-known companies such as Microsoft, Apple or IBM. They could even use the
MorePhone Fraud
Telephone fraud involves criminals contacting you by phone (vishing) or by text (Smishing) pretending to be your bank, credit card issuer, utility company or often a computer company. During the conversation they will try and trick you into giving personal, banking or
MoreEmail Fraud
Email fraud (“Phishing”) involves fraud perpetrators making contact by email and can take a number of forms. The email may appear to be from a reputable company however when one clicks on the email or attachment or link within the email, malicious
MoreBusiness Email Compromise (BEC) Fraud
Business Email Compromise (BEC) Fraud (or CEO Fraud) is similar to Invoice Redirection Fraud however in this case junior employees in the finance department of a company receive an email from a fraud perpetrator purporting to be the Chief Executive Officer stating
More