Online and mobile products and services are increasingly being used for our daily activities, such as shopping, banking, social networking, dating, etc. Doing so, we reveal personal data to different parties, which can be used to construct detailed profiles of ours and track us through the different web sites we visit. In other cases, we might find ourselves in a difficult position due to information published online which cannot be removed.

How can internet users protect themselves and exersice their data protection rights in the digital world?

Over the last years, ENISA has been studying the area of online and mobile data protection, analysing security models of electronic services and providing relevant guidelines on users’ privacy and trust.

To this end, one dimension of our work has been that of online tracking, in particular through our Report on privacy considerations on online behavioural tracking, as well as our earlier Report on privacy and security aspects of cookies.

Moreover, in the area of users rights, we have published a Report on the right-to-be-forgotten, discussing the practical implementation of this new right (under the General Data Protection Regulation).

In the same line we have also conducted an earlier Study on online privacy, accountability and trust, as well as a Survey on online accountability, trust, consent and tracking. Also, we have published a Study on the security, usability and privacy of online seals as a means for increasing users’ trust.

Another area of ENISA's work has been that of online and mobile security, where we published our findings in a Report on Web 2.0 security, as well as a Report on the security of smartphones.

The economics of online privacy has also been an area of interest for ENISA, especially in relation to service personalisation and use of free services. Relevant findings have been published in our Study of monetising privacy.

Last, we have studied the broader area of reputation systems and published our relevant Report on trust and reputation models, as well as the Report on security analysis of reputation-based systems.  

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information