Earlier today I read the news from NetBlocks (via Reuters) that since the weekend parts of the Ukrainian internet traffic are rerouted via Russia. To be precise, it’s about Ukrainian Kherson Oblast, which is occupied by Russia since March.
Now I wanted to trace the internet route myself and ideally visualize it. Here I came across the service of GeoTraceroute, which does a great job in visualizing traceroutes (aka. tracert). For the trace, I chose Frankfurt as starting point, and skynet.ua, the local internet provider in Kherson, as the endpoint.
Of course, you can also include the URL of GeoTraceroute as a web element in your Power BI report or Tableau dashboard and parameterize it for dynamic interactions. You can see the format as in my example:
Taking a different perspective: now I am a certified data protection officer (Datenschutzbeauftragter (TÜV)).
The required one-week training was packed with insights on how data processing can be made globally compliant with GDPR. I look forward to advising our customers on how organizations can effectively implement GDPR from a technical and organizational perspective.
What are the topics covered by this certification?
In the examination, the participants demonstrate knowledge in the following areas:
Organization of Data Protection and Data Security in the company
Operational tasks of the Supervisor
“Data Protection Officers (TÜV)” have assured knowledge in the sense of Art. 37 (5) EU Data Protection Basic Regulation. They are familiar with the legal provisions on data protection (e.g. EU-DSGVO, new BDSG), the tasks, rights and duties of the data protection officer and the components of an efficient data protection management system. You are able to implement and maintain the basic features of such a system.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.