Interplay between security and data protection assessments #44
Labels
clarification
White paper needs clarification
legal
Questions or comments regarding data protection/legal topics
privacy risk
Questions or comments regarding privacy issues and concerns
The way this protocol is rolled out is an interesting kind of optimization within constraints:
It is therefore composed of two assessments: a data protection assessment on top of a security assessment.
However the paper fails to convey well how dynamic the data protection assessment should be, compared to the security assessment.
For instance, if some of the following conditions are satisfied:
the entire data protection assessment would immediately reach a different conclusion through the Breyer test.
The text was updated successfully, but these errors were encountered: