Unlike the scope of protection of the ePrivacy Regulation also covers legal persons. Scope of application of ePrivacy – lawyer’s comment Extend the circle of entities that will have to comply with the new regulation is an important step towards increas privacy protection. More and more often we communicate via services such as Messenger, Skype, WhatsApp or e-mail. Confintiality of this form of communication should be subject to the same rules as traditional communication methods, such as voice calls or text messages.
It is also worth not that the Eprivacy
Regulation is also to cover machine-to-machine communication . These are messages that are not sent consciously by users , but are sent between vices connect to the network, as long as these messages contain personal data. For example, these Slovenia Mobile Number List are situations where vices collect information about us and share it with third parties. The correlation of these data can lead to a significant violation of privacy – the sum of data from different vices can reveal potentially sensitive and personal data of users . The draft ePrivacy regulation also recognizes the problem of insufficiently secur Wi-Fi networks and contains precise recommendations to ensure the confintiality of communication in such networks.
From the users perspective the changes
Propos in the ePrivacy project should be assess positively. The new regulation will certainly contribute to increas the level of protection of the confintiality of communication in the network.” ePrivacy Regulation – ) The principle of data confintiality The UK Email Database principle of data confintiality covers both the content of electronic communication, text, voice, sound, image, etc., as well as metadata riv from such communication, includ: date, time, call duration, or location data. Process of data from electronic communications will be possible only in specific cases, primarily – if it is necessary for the provision of electronic communications services, in orr to maintain or restore the security of networks or services, or with the consent of the user.