{"id":6423,"date":"2021-06-29T14:47:39","date_gmt":"2021-06-29T12:47:39","guid":{"rendered":"https:\/\/edorteam.com\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"},"modified":"2021-07-19T14:36:54","modified_gmt":"2021-07-19T12:36:54","slug":"incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","title":{"rendered":"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.8.1&#8243; custom_padding=&#8221;0px||||false|false&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.8.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;0px|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||8vh||false|false&#8221;]<\/p>\n<p>Recently, the AEPD has published an update of its  <a href=\"https:\/\/www.aepd.es\/es\/node\/799\" target=\"_blank\" rel=\"noopener\"><strong><em>Guide for the notification of personal data breaches<\/em><\/strong><\/a> , a useful document so that those responsible for processing personal data know when to <strong>report a breach to the supervisory authority,<\/strong> in what term, or who and what content should include that notification.<\/p>\n<p>In addition to publishing the new guide, the AEPD makes a<strong> assessment of the current situation<\/strong> in terms of personal data breaches, of which we highlight this fragment:<\/p>\n<blockquote>\n<p><em>&#8220;The Agency has managed more than 700 data breaches reported in the first five months of 2021. Most of them have been caused by an external and intentional attack, ransomware being the most frequent threat, compromising not only availability but also confidentiality of personal data &#8220;.<\/em><\/p>\n<\/blockquote>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||8vh||false|false&#8221;]<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 ez-toc-wrap-left-text counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor:pointer\">Contenido del art\u00edculo<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#If_you_do_not_apply_these_cybersecurity_measures_in_your_company_you_are_in_breach_of_the_LOPD_and_RGPD\" >If you do not apply these cybersecurity measures in your company, you are in breach of the LOPD and RGPD<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#Avoid_most_personal_data_breaches_with_ET_Seguridad\" >Avoid most personal data breaches with ET Seguridad<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#Guiding_incident\" >Guiding incident<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#How_does_ET_Seguridad_solve_it\" >How does ET Seguridad solve it?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#Get_ET_Security_at_a_special_price\" >Get ET Security at a special price<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"If_you_do_not_apply_these_cybersecurity_measures_in_your_company_you_are_in_breach_of_the_LOPD_and_RGPD\"><\/span>If you do not apply these cybersecurity measures in your company, you are in breach of the LOPD and RGPD<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We insist on the importance of<strong> implement preventive security measures<\/strong> as the only effective way to protect the personal data that your company guards against cyberattacks, abuse of internal privileges or human errors.<\/p>\n<p>We recall that the LOPD requires the implementation of<strong> following cybersecurity measures<\/strong> for correct compliance:<\/p>\n<ul>\n<li>Register and control the accesses made to files and programs that contain personal data. To do this, you need a<a href=\"\/et-seguridad-software-productividad-empresa\/\"> registration and access control software such as ET Seguridad.<\/a><\/li>\n<li>Limit the resources of the computer equipment to which users have access only to those they need for the development of their work functions (also possible with<a href=\"\/et-seguridad-software-productividad-empresa\/\"> ET Security<\/a> ).<\/li>\n<li>Encrypt or password protect files, programs and removable devices that contain personal data,<a href=\"\/cifrado-seguro-archivos-aes-256\/\"> something possible with ET Encrypt<\/a> , included free of charge with ET Seguridad.<\/li>\n<li>Last but not least, you need to make physical and online backups of all the data on your business network. Cloud copies should be stored encrypted and duplicated elsewhere,<a href=\"https:\/\/edorteam.com\/et-backup-cloud-backup\/?lang=en\"> as we offer with ET Backup<\/a> . This is the only truly effective weapon against ransomware attacks, as they are becoming increasingly aggressive and difficult to block.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Avoid_most_personal_data_breaches_with_ET_Seguridad\"><\/span>Avoid most personal data breaches with ET Seguridad<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The AEPD includes in its new guide the<strong> incidents that can cause a security breach<\/strong> . In this table we detail which are the most common and how to prevent them:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; custom_margin=&#8221;||8vh||false|false&#8221;]<\/p>\n<table border=\"1\" style=\"width: 100%; border-collapse: collapse; border-style: solid; border-color: #e5e5e5; height: 706px;\" cellpadding=\"10\" cellspacing=\"10\">\n<tbody>\n<tr style=\"height: 66px;\">\n<th style=\"width: 36.5407%; height: 66px; vertical-align: bottom;\">\n<h4><span class=\"ez-toc-section\" id=\"Guiding_incident\"><\/span><strong>Guiding incident<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/th>\n<th style=\"width: 63.4593%; height: 66px; vertical-align: bottom;\">\n<h4><span class=\"ez-toc-section\" id=\"How_does_ET_Seguridad_solve_it\"><\/span><strong>How does ET Seguridad solve it?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/th>\n<\/tr>\n<tr style=\"height: 128px;\">\n<td style=\"width: 36.5407%; height: 128px;\"><strong>Unauthorized modification or deletion of personal data<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 128px;\">\n<ul>\n<li>Configure user profiles to limit access and functions of the computer equipment.<\/li>\n<li>In the event of an incident, the activity log will determine who and when deleted or modified the data.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 152px;\">\n<td style=\"width: 36.5407%; height: 152px;\"><strong>Abuse of access privileges to extract, forward or copy personal data<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 152px;\">\n<ul>\n<li>Configure user profiles to limit access and functions of the computer equipment.<\/li>\n<li>Control access to certain files with username and password.<\/li>\n<li>In the event of an incident, the activity log will record who, when and what actions performed on the IT equipment.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 36.5407%; height: 104px;\"><strong>Personal data sent by mistake electronically<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 104px;\">\n<ul>\n<li>Use the ET Encrypt tool to encrypt any document with personal data that you are going to send over the internet. Thus, in case of human error, you will prevent them from reading the content.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 36.5407%; height: 104px;\"><strong>Lost or stolen device<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 104px;\">\n<ul>\n<li>Use the ET Encrypt tool to preventively encrypt your removable USB devices. Thus, in case of loss or theft, you will prevent them from accessing its content.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 152px;\">\n<td style=\"width: 36.5407%; height: 152px;\"><strong>Cyber incident: unauthorized access to personal data<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 152px;\">\n<ul>\n<li>Configure user profiles to prevent unauthorized access to confidential information.<\/li>\n<li>Control access to documents containing personal data with username and password, or store them always encrypted.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;Remember that, if you always predict documents containing personal data, it will not be necessary to notify the AEPD in the event of a cyber-incident or human error.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%45%%&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The reason for this is that, in the event that a file falls into the hands of an unauthorized third party, if it was previously encrypted, it will not be possible to access its content unless you know the password. Therefore,<strong> confidential information will remain intact, thus avoiding a personal data breach.<\/strong><\/p>\n<p>The preventive encryption of sensitive information, whether it is the one you store on your computer or the one you send over the internet, is a very simple habit once it has been acquired and is very beneficial for business activity, since it protects you, not only from external attacks, but from inadvertent human errors.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; background_color=&#8221;#0073ce&#8221; custom_padding=&#8221;0px||0px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;800ms&#8221; animation_intensity_slide=&#8221;5%&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1800px&#8221; custom_margin=&#8221;0px||0px&#8221; custom_padding=&#8221;0px||0px|&#8221; use_custom_width=&#8221;on&#8221; width_unit=&#8221;off&#8221; custom_width_percent=&#8221;90%&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0073ce&#8221; header_2_font_size=&#8221;1.6em&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;12%|8%|12%|8%|true|true&#8221; header_font_size_phone=&#8221;34px&#8221; header_font_size_last_edited=&#8221;off|phone&#8221;]<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Get_ET_Security_at_a_special_price\"><\/span>Get ET Security at a special price<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Request your personalized offer and start applying all these digital security measures. Get<strong> complete LOPD security.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ3NzkifX0=@&#8221; button_text=&#8221;Request offer&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;button_url&#8221; background_layout=&#8221;dark&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#0073ce&#8221; background_color_gradient_end=&#8221;#001954&#8243; background_color_gradient_type=&#8221;radial&#8221; background_image=&#8221;https:\/\/edorteam.com\/wp-content\/uploads\/software-productividad-empresarial-lopd.png&#8221; background_size=&#8221;contain&#8221; custom_padding=&#8221;|||&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ3NzkifX0=@&#8221; custom_padding__hover=&#8221;|||&#8221; background__hover_enabled=&#8221;on|hover&#8221; background_blend__hover=&#8221;screen&#8221; background_enable_color__hover=&#8221;on&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.8.1&#8243; height=&#8221;250px&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, the AEPD has published an update of its Guide for the notification of personal data breaches , a useful document so that those responsible for processing personal data know when to report a breach to the supervisory authority, in what term, or who and what content should include that notification. In addition to publishing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[110,106,122],"tags":[117,119,124,120,123,118,125,121],"class_list":["post-6423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-data-protection-and-rgpd","category-file-encryption","tag-access-control","tag-aepd-en","tag-aes-256-en","tag-cyber-attack","tag-data-confidentiality","tag-data-protection","tag-encrypt-files","tag-ransomware-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Incidents that cause personal data breaches and how to avoid them<\/title>\n<meta name=\"description\" content=\"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incidents that cause personal data breaches and how to avoid them\" \/>\n<meta property=\"og:description\" content=\"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Edorteam\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edorteam\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T12:47:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-19T12:36:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"498\" \/>\n\t<meta property=\"og:image:height\" content=\"346\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Edorteam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@edorteam\" \/>\n<meta name=\"twitter:site\" content=\"@edorteam\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edorteam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\"},\"author\":{\"name\":\"Edorteam\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6\"},\"headline\":\"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them\",\"datePublished\":\"2021-06-29T12:47:39+00:00\",\"dateModified\":\"2021-07-19T12:36:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\"},\"wordCount\":1157,\"commentCount\":10,\"publisher\":{\"@id\":\"https:\/\/edorteam.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"keywords\":[\"access control\",\"aepd\",\"aes 256\",\"cyber attack\",\"data confidentiality\",\"Data Protection\",\"encrypt files\",\"ransomware\"],\"articleSection\":[\"Cybersecurity\",\"Data protection and RGPD\",\"File encryption\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\",\"url\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\",\"name\":\"Incidents that cause personal data breaches and how to avoid them\",\"isPartOf\":{\"@id\":\"https:\/\/edorteam.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"datePublished\":\"2021-06-29T12:47:39+00:00\",\"dateModified\":\"2021-07-19T12:36:54+00:00\",\"description\":\"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.\",\"breadcrumb\":{\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage\",\"url\":\"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"contentUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"width\":498,\"height\":346,\"caption\":\"Protect your data against accidental or malicious information leaks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/edorteam.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/edorteam.com\/en\/#website\",\"url\":\"https:\/\/edorteam.com\/en\/\",\"name\":\"Consultor\u00eda Compliance y protecci\u00f3n de datos\",\"description\":\"Empresa de Ciberseguridad y Protecci\u00f3n de Datos\",\"publisher\":{\"@id\":\"https:\/\/edorteam.com\/en\/#organization\"},\"alternateName\":\"Edorteam\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/edorteam.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/edorteam.com\/en\/#organization\",\"name\":\"Edorteam | Cibersecurity services and data protection company\",\"alternateName\":\"Edorteam\",\"url\":\"https:\/\/edorteam.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png\",\"contentUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Edorteam | Cibersecurity services and data protection company\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/edorteam\/\",\"https:\/\/x.com\/edorteam\",\"https:\/\/www.linkedin.com\/company\/edorteam\/\",\"https:\/\/www.instagram.com\/edorteam\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6\",\"name\":\"Edorteam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"caption\":\"Edorteam\"},\"sameAs\":[\"http:\/\/edorteam.com\"],\"url\":\"https:\/\/edorteam.com\/en\/author\/web_edorteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incidents that cause personal data breaches and how to avoid them","description":"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","og_locale":"en_US","og_type":"article","og_title":"Incidents that cause personal data breaches and how to avoid them","og_description":"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.","og_url":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","og_site_name":"Edorteam","article_publisher":"https:\/\/www.facebook.com\/edorteam\/","article_published_time":"2021-06-29T12:47:39+00:00","article_modified_time":"2021-07-19T12:36:54+00:00","og_image":[{"width":498,"height":346,"url":"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","type":"image\/jpeg"}],"author":"Edorteam","twitter_card":"summary_large_image","twitter_creator":"@edorteam","twitter_site":"@edorteam","twitter_misc":{"Written by":"Edorteam","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#article","isPartOf":{"@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"},"author":{"name":"Edorteam","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6"},"headline":"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them","datePublished":"2021-06-29T12:47:39+00:00","dateModified":"2021-07-19T12:36:54+00:00","mainEntityOfPage":{"@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"},"wordCount":1157,"commentCount":10,"publisher":{"@id":"https:\/\/edorteam.com\/en\/#organization"},"image":{"@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","keywords":["access control","aepd","aes 256","cyber attack","data confidentiality","Data Protection","encrypt files","ransomware"],"articleSection":["Cybersecurity","Data protection and RGPD","File encryption"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","url":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","name":"Incidents that cause personal data breaches and how to avoid them","isPartOf":{"@id":"https:\/\/edorteam.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage"},"image":{"@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","datePublished":"2021-06-29T12:47:39+00:00","dateModified":"2021-07-19T12:36:54+00:00","description":"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.","breadcrumb":{"@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage","url":"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","contentUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","width":498,"height":346,"caption":"Protect your data against accidental or malicious information leaks"},{"@type":"BreadcrumbList","@id":"https:\/\/edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/edorteam.com\/en\/"},{"@type":"ListItem","position":2,"name":"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them"}]},{"@type":"WebSite","@id":"https:\/\/edorteam.com\/en\/#website","url":"https:\/\/edorteam.com\/en\/","name":"Consultor\u00eda Compliance y protecci\u00f3n de datos","description":"Empresa de Ciberseguridad y Protecci\u00f3n de Datos","publisher":{"@id":"https:\/\/edorteam.com\/en\/#organization"},"alternateName":"Edorteam","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/edorteam.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/edorteam.com\/en\/#organization","name":"Edorteam | Cibersecurity services and data protection company","alternateName":"Edorteam","url":"https:\/\/edorteam.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png","contentUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png","width":512,"height":512,"caption":"Edorteam | Cibersecurity services and data protection company"},"image":{"@id":"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edorteam\/","https:\/\/x.com\/edorteam","https:\/\/www.linkedin.com\/company\/edorteam\/","https:\/\/www.instagram.com\/edorteam\/"]},{"@type":"Person","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6","name":"Edorteam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","caption":"Edorteam"},"sameAs":["http:\/\/edorteam.com"],"url":"https:\/\/edorteam.com\/en\/author\/web_edorteam\/"}]}},"_links":{"self":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/comments?post=6423"}],"version-history":[{"count":0,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6423\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/media\/6186"}],"wp:attachment":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/media?parent=6423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/categories?post=6423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/tags?post=6423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}