Questions tagged [Data protection] (234)

1
answer

What courses protection personal PC and personal network to learn?

Once saw a nice guide. But not read in time, and now he's somewhere in the browser history. Please give me the link to the old one article. There was a lot about. Ridiculous.
Malinda_Gusikows asked April 18th 20 at 13:16
1
answer

What is the legal base that regulates the thumbprint of the browser?

Good day, tell me under which regulation gets the thumbprint of the browser? Do I need to take consent from the user when forming the print? If so, why. On many sites the thumbprint listed in the list of processed personal data. Although in fact he does not indicate the person and the device, and one device might have a wh...
jed.Jacobson40 asked April 16th 20 at 10:57
6
answers

How to protect code if offered assistance with development?

Hello! Developed a bot for one of the popular platforms. However, in connection with the busy, no time to do them at the proper level. I quite often write, and this time asked for a link to the source code of the bot or access to the private code to "help fix errors". Should we give and what are the options to protect the ...
augusta.Langworth39 asked April 8th 20 at 17:40
4
answers

How to protect source code?

Tell me, are faced with this problem, I want to write a plugin, but I don't want to use those who have not paid for his purchase. Looking toward obfuscation everywhere says that for every obfuscator there is deobfuscator, even the same ioncube deciphered by the Indians for $15. A good option is to create the key on the serv...
cayla_Ema asked April 8th 20 at 02:51
4
answers

Is it possible to spoof the IP to a specific IP from the other?

Faced with a payment system, which band protects the transmitted data. In fact, only a comparison of IP offer limited security. Hence the question - how realistic is it to spoof IP to specify a specific IP?
devonte.Bart asked April 7th 20 at 16:17
2
answers

What documents are needed for personal data storage?

The task was to implement ERP. It will be introduced the personal data of the customers. How to organize their storage and protection? What documents are needed for implementation?
xavier.Herm asked April 7th 20 at 15:45
3
answers

To restrict access to the files on google disk and yandex disk?

Question, is it possible to block part of the access function to download files from the host machines in the cloud of Google and Yandex are there any ready-made solution. In simple language it is necessary to prohibit the uploading user files to the cloud but to read visually, all opened and download selected files from ha...
Yolanda21 asked April 7th 20 at 11:36
2
answers

Google Sheets. How to protect rows and columns from deletion?

Hello! Please tell me how to Google the table to protect sheet from deletion of lines and columns? In Excel has to be set first through the cell (put a check box) and then using the button "Protect sheet". In Google spreadsheets I found only how to protect the ranges and the sheets, but with options either all actions can b...
Margret24 asked April 7th 20 at 10:45
3
answers

What books about cryptography to read?

What books advise on cryptography?
julien_Hansen7 asked April 4th 20 at 01:34
2
answers

How to protect the data in the CRM from the point of view of the law and not only?

The planned creation of a CRM for the printing of contracts, accounting of the history of customer requests, gathering statistics of its sales, etc. in the Saas model. I read a bunch of articles on habré about FSTEC, protection of PD, but did not understand whether there are specific legal requirements for such CRM? Planned...
billy_Ondric asked April 3rd 20 at 18:25