Search
Close this search box.
AI-based solution designed to automate personal data discovery and classification
Discover personal data across multiple systems in the cloud or on-premise
Turn data subjects request into an automated workflow with a clear insight into data every step of the way
Collaborate with stakeholders and manage DPIA and LIA in real-time with Assessment Automation
Privacy portal allows customers to communicate their requests and preferences at any time
Introducing end-to end automation of personal data removal

Latest Blog posts

Learn the terms

General Data Protection Regulation

Here you can find the official content of the Regulation (EU) 2016/679 (General Data Protection Regulation) in the current version. All Articles of the GDPR are linked with suitable recitals.

Latest papers

Keylogging

Keylogging, also known as keystroke logging,  is a method of monitoring and recording the keys pressed on a keyboard.

Keylogging can be done through software or hardware, and it can be used for a variety of purposes, including surveillance, monitoring, and cybersecurity.

In some cases, keystroke logging may be used for legitimate purposes, such as monitoring employee activity to ensure compliance with company policies or to detect fraudulent activity. However, keystroke logging can also be used for malicious purposes, such as stealing passwords, credit card numbers, or other sensitive information.

Keylogging can be difficult to detect, as it can be done silently and may not produce any visible changes on the computer screen.

To protect against keylogging it’s important to use antivirus software and keep it updated, be cautious of suspicious emails and attachments, and avoid using public computers for sensitive tasks like online banking or shopping.

All glossaries
  • All
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • K
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
Scroll to Top