Bucharest bets on nuclear to shore up energy security on EUās eastern flank
When adjusted for purchasing power, Romanian consumers grapple with some of the highest electricity costs worldwide
Current events, updates, and developments in data protection law
When adjusted for purchasing power, Romanian consumers grapple with some of the highest electricity costs worldwide
Distribution System Operators (DSOs) are emerging as key resilience actors. By integrating renewables, strengthening cybersecurity, adapting to climate risks and enabling anticipatory investment, DSOs are essential to building a secure and future-proof European energy system.
A judicial rebuke in Washington altered the legal landscape, but not Europeās political calculus, where security dependence on the US outweighs economic self-interest
Europe risks falling into a dangerous rhetoric-reality gap; it cannot claim unity while pursuing contradictory national policies
In the third part of our blog series on the dodgy digital security practices underlying advanced AI tools, we look at how the availability of systems is impacted by the proliferation of large language models. The post Artificial Insecurity: access and availability in the age of AI appeared first on Access Now.
Wisconsinās S.B. 130 / A.B. 105 is a spectacularly bad idea. Itās an age-verification bill that effectively bans VPN access to certain websites for Wisconsinites and censors lawful speech. We wrote about it last November in our blog āLawmakers Want to Ban VPNsāAnd They Have No Idea What They're Doing,ā but since then, the bill has passed the State Assembly and is scheduled for a vote in the State Senate tomorrow. In light of this, EFF sent a letter to the entire Wisconsin Legislature urging
PRĆSENTIERT VON AMAZON.
}}}} The DPA issued a warning to the Federal Public Service for Finances to ensure compliance with security of personal data processing after an employee accessed the address of an individual and visited her at her home.The DPA issued a warning to the Federal Public Service for Finances after an employee unlawfully accessed the address of an individual in the controllerās database and visited her at her home. == English Summary ==== English Summary ==
Canadian leader pitched British counterpart on nascent Defense Security and Resilience Bank, as industry and backbench calls mount for the U.K. to take part.
āWhat protects us is the strength of the alliance," a senior NATO official says.
In today's edition: Mercosur, CBAM, state aid
Albania's defence minister argues his country is key for EU security
An email sent to lawmakers, seen by Euractiv, shows the Parliament worried about how much data goes to AI companies
Facts: typo The Local Territorial Agency for Residential Housing (Azienda territoriale per lāedilizia residenziale) submitted a complaint to the DPA regarding the installation of security cameras by the business āMacelleria La Costata s.r.l.s.ā, a local butcher . The Local Territorial Agency for Residential Housing (Azienda territoriale per lāedilizia residenziale) submitted a complaint to the DPA regarding the installation of security cameras by the business āMacelleria La Costata s.r.l.s.ā, a
In today's edition: EU Five Eyes, Dutch AI agnt warning, far-right vs EU space security, UK fines Kick
The elephant in the room was the growing rift between Washington and the world
Eurelectric suggested a "financial support system" to help utilities' play their critical role in national security
In the second part of our series on the dodgy digital security practices underlying advanced AI tools, we examine how LLMs threaten information integrity. The post Artificial Insecurity: threats to information integrity appeared first on Access Now.
De Autoriteit Persoonsgegevens (AP) waarschuwt gebruikers en organisaties voor het gebruik van OpenClaw en soortgelijke experimentele systemen. De aanleiding is de hoge snelheid waarmee OpenClaw populair is geworden. Dit soort open source-systemen voldoen al snel niet aan basisveiligheidseisen. Het gebruik van dergelijke experimentele AI-agents brengt grote risicoās met zich mee, zoals datalekken en accountovernames.
Criticize the government online? The Department of Homeland Security (DHS) might ask Google to cough up your name. By abusing an investigative tool called "administrative subpoenas," DHS has been demanding that tech companies hand over users' names, locations, and more. We're explaining how companies can stand up for usersāand covering the latest news in the fight for privacy and free speech onlineāwith our EFFector newsletter. For over 35 years, EFFector has been your guide to underst
English Summary }}}} The DPA fined the Polish national postal operator ā¬232k for a DPO conflict of interest. The DPO concurrently served as a Security Director and company proxy, effectively monitoring their own decisions regarding the means of data processing.The DPA fined the national postal operator ā¬232,000 for appointing a DPO with a conflict of interest. The DPO concurrently served as a Security Director and representative of the controller, effectively monitoring their own decisions regar
We are calling on technology companies like Meta and Google to stand up for their users by resisting the Department of Homeland Security's (DHS) lawless administrative subpoenas for user data. In the past year, DHS has consistently targeted people engaged in First Amendment activity. Among other things, the agency has issued subpoenas to technology companies to unmask or locate people who have documented ICE's activities in their community, criticized the government, or attended protes
In the first part of our blog series on the dodgy digital security practices underlying advanced AI tools, we unpack how LLMs can jeopardize the confidentiality of peopleās data. The post Artificial Insecurity: how AI tools compromise confidentiality appeared first on Access Now.
Today, weāre launching Encrypt It Already, our push to get companies to offer stronger privacy protections to our data and communications by implementing end-to-end encryption. If that name sounds a little familiar, itās because this is a spiritual successor to our 2019 campaign, Fix It Already, a campaign where we pushed companies to fix longstanding issues. End-to-end encryption is the best way we have to protect our conversations and data. It ensures the company that provides a service cannot
U.S. Homeland Security Secretary Kristi Noem last week posted a photo of the arrest of Nekima Levy Armstrong, one of three activists who had entered a St. Paul, Minn. church to confront a pastor who also serves as acting field director of the St Paul Immigration and Customs Enforcement (ICE) office. A short while later, the White House posted the same photo ā except that version had been digitally altered to darken Armstrongās skin and rearrange her facial features to make it appear she was sobb
Dangerously unchecked surveillance and rights violations have been a throughline of the Department of Homeland Security since the agencyās creation in the wake of the September 11th attacks. In particular, Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) have been responsible for countless civil liberties and digital rights violations since that time. In the past year, however, ICE and CBP have descended into utter lawlessness, repeatedly refusing to exercise or
So many data breaches happen throughout the year that it can be pretty easy to gloss over not just if, but how many different breaches compromised your data. We're diving into these data breaches and more with our latest EFFector newsletter. Since 1990, EFFector has been your guide to understanding the intersection of technology, civil liberties, and the law. This latest issue tracks U.S. Immigration and Customs Enforcement's (ICE) surveillance spending spree, explains how hackers are
Government.
Report: "Information Security within Digital Voting Assistance Tools," attached as an appendix to the evaluation of the Dutch Lower House elections of October 29, 2025.
Government
Rapport 'Informatiebeveiliging binnen digitale stembureauhulpmiddelen', als bijlage bij de evaluatie Tweede Kamerverkiezingen 29 oktober 2025
=== Verwerking ====== Verwerking === Het geschil betrof de verantwoordelijkheid van de verwerker voor het implementeren van adequate beveiligingsmaatregelen, zoals vereist volgens artikel 32 van de AVG. Het geschil betrof de verantwoordelijkheid van de verwerker voor het implementeren van adequate beveiligingsmaatregelen, zoals vereist volgens artikel 32 van de AVG. "Over de eerlijkheid van de procedure:" "Over de eerlijkheid van de procedure:" "Over verantwoordelijkheden:" "Over verantwoordelijkheden:"
=== Holding ====== Holding === The dispute related to the processorās responsibility for implementing adequate security measures, under article 32 GDPR. The dispute related to the processorās responsibility for implementing adequate security measures, under Article 32 GDPR. '''On the fairness of the procedure:''' '''On the fairness of the procedure:''' '''About responsibilities:''' '''About r
Facts }}}} The DPA fined a bank ā¬500,000 after it lost a customerās documents sent through a courier. The authority held that the bank failed to ensure adequate security and proper supervision of its processor under [[Article 32 GDPR|Article 32 GDPR]].The DPA fined a bank ā¬500,000 for losing a customerās documents when transporting them via a courier. The DPA held that the bank failed to ensure adequate security and proper supervision of its processor under [[Article 32 GDPR]]. == English Summar
Facts: The data protection authority (DPA) has fined a bank ā¬500,000 after documents belonging to a customer were lost during delivery by a courier service. The authority ruled that the bank had not ensured adequate security measures and proper oversight of the service provider, in accordance with Article 32 of the GDPR. The DPA imposed a fine of ā¬500,000 on a bank because customer documents were lost during transport via a courier service. The DPA determined that the bank had not provided sufficient security and adequate oversight of the service provider, in accordance with Article 32 of the GDPR. Summary in English: A bank was fined ā¬500,000 by the data protection authority because customer documents were lost during delivery by a courier service. The authority found that the bank had failed to implement adequate security measures and proper oversight of the service provider, violating Article 32 of the GDPR.
Feiten: De gegevensbeschermingsautoriteit (DPA) heeft een bank een boete van 500.000 euro opgelegd nadat documenten van een klant, verzonden via een koerier, verloren waren gegaan. De autoriteit oordeelde dat de bank er niet voor had gezorgd dat er voldoende beveiliging was en dat er een goede controle was op de dienstverlener, in overeenstemming met artikel 32 van de AVG. De DPA heeft een bank een boete van 500.000 euro opgelegd omdat documenten van een klant verloren waren gegaan tijdens het transport via een koerier. De DPA oordeelde dat de bank niet had gezorgd voor voldoende beveiliging en een goede controle op de dienstverlener, in overeenstemming met artikel 32 van de AVG. == Samenvatting in het Engels
=== Processing ====== Processing === The dispute concerned the processor's responsibility for implementing adequate security measures, as required by Article 32 of the GDPR. The dispute concerned the processor's responsibility for implementing adequate security measures, as required by Article 32 of the GDPR. "Regarding the fairness of the procedure:" "Regarding the fairness of the procedure:" "Regarding responsibilities:" "Regarding responsibilities:"
}}}} The DPA imposed a 1 700 000 ⬠fine under [[Article 32 GDPR|Article 32 GDPR]] to a processor who had incorrectly configured a software that processed files relating to persons with disabilities, leading to a massive data breach.The DPA imposed a ā¬1,700,000 fine to a processor who had incorrectly configured a software that processed files relating to persons with disabilities, leading to a massive data breach. == English Summary ==== English Summary == === Facts ====== Facts === A software co
Learn more about how ICE (Immigration and Customs Enforcement) has spent hundreds of millions of dollars on surveillance technology to spy on everyone ā and potentially the entire population ā in the United States, and how you can track the spending of the Department of Homeland Security. ICE has been conducting raids in American cities, targeting, observing, intimidating, mistreating, arresting, and torturing people who are living in the country illegally. They have also been targeting people with work permits, asylum seekers, permanent residents (people with a "green card"), and naturalized citizens.
Read more about how ICE has spent hundreds of millions of dollars on surveillance technology to spy on anyoneāand potentially everyoneāin the United States, and how to follow the Homeland Security Spending Trail.. ICE has been invading U.S. cities, targeting, surveilling, harassing, assaulting, detaining, and torturing people who are undocumented immigrants. They also have targeted people with work permits, asylum seekers, permanent residents (people holding āgreen cardsā), naturalized citizens,
Read more about how enterprising hackers have started projects to do counter surveillance against ICE, and learn how to follow the Homeland Security spending trail. U.S. Immigration and Customs Enforcement (ICE) has a new budget under the current administration, and they are going on a surveillance tech shopping spree. Standing at $28.7 billion dollars for the year 2025 (nearly triple their 2024 budget) and at least another $56.25 billion over the next three years, ICE's budget would be the
Lees meer over hoe ondernemende hackers projecten zijn gestart om toezicht te houden op de activiteiten van ICE en leer hoe u de bestedingen van het Ministerie van Binnenlandse Veiligheid kunt volgen. De Amerikaanse Immigratie- en Douanehandhaving (ICE) heeft een nieuw budget onder de huidige regering, en ze zijn bezig met een grootschalige aanschaf van surveillanceapparatuur. Met een budget van 28,7 miljard dollar voor 2025 (bijna drie keer zoveel als hun budget voor 2024) en minstens nog eens 56,25 miljard dollar over de komende drie jaar, zou het budget van ICE het...
Learn more about how activist hackers have launched projects to monitor the activities of ICE, and discover how you can track the spending of the Department of Homeland Security. The U.S. Immigration and Customs Enforcement (ICE) has a new budget under the current administration, and they are in the process of acquiring a large amount of surveillance equipment. With a budget of $28.7 billion for 2025 (nearly three times the amount allocated for 2024), and at least an additional $56.25 billion over the next three years, ICE's budget represents...
This guide was co-written by Andrew Zuker with support from the Heinrich Boell Foundation. The U.S. government publishes volumes of detailed data on the money it spends, but searching through it and finding information can be challenging. Complex search functions and poor user interfaces on government reporting sites can hamper an investigation, as can inconsistent company profiles and complex corporate ownership structures. This week, EFF and the Heinrich Boell Foundation released an update to
This guide was written by Andrew Zuker, with support from the Heinrich Boell Foundation. The U.S. government publishes vast amounts of detailed data on spending, but searching through this data and finding relevant information can be challenging. Complex search functions and poorly designed user interfaces on government websites can hinder research, as can inconsistent company profiles and complex corporate structures. This week, EFF and the Heinrich Boell Foundation released an updated version of...
2025 was the year when age verification transitioned from a niche experiment to a widespread reality in the United States. Currently, half of the U.S. states require age verification for access to adult content or social media platforms. Nine states alone enacted laws this year, and more are expected in 2026. The good news is that courts have blocked many of the laws intended to mandate age verification on social media, primarily for the same reasons that the Electronic Frontier Foundation (EFF) opposes these efforts. Age verification...
Our guides on privacy protection and self-defense (Surveillance Self-Defense, SSD), which offer practical tips and explanations on how to deal with government and corporate surveillance, have had a successful year. We have published several important updates to existing guides and released three completely new guides. Given the frequent and large-scale protests in the United States, our guide on participating in a protest remained one of the most popular of the year, so we made sure our translations were up-to-date. (Re)learn everything you need to know about encryption. We've started...
2025 was the year age verification went from a fringe policy experiment to a sweeping reality across the United States. Half of the U.S. now mandates age verification for accessing adult content or social media platforms. Nine states saw their laws take effect this year alone, with more coming in 2026. The good news is that courts have blocked many of the laws seeking to impose age-verification gates on social media, largely for the same reasons that EFF opposes these efforts. Age-verification m
Our Surveillance Self-Defense (SSD) guides, which provide practical advice and explainers for how to deal with government and corporate surveillance, had a big year. We published several large updates to existing guides and released three all new guides. And with frequent massive protests across the U.S., our guide to attending a protest remained one of the most popular guides of the year, so we made sure our translations were up to date. (Re)learn All You Need to Know About Encryption We starte
Onze handleidingen over privacybescherming en zelfverdediging (Surveillance Self-Defense, SSD), die praktische tips en uitleg bieden over hoe u om moet gaan met overheids- en bedrijfsbewaking, hebben een succesvol jaar gehad. We hebben verschillende belangrijke updates gepubliceerd voor bestaande handleidingen en drie volledig nieuwe handleidingen uitgebracht. Gezien de frequente en grootschalige protesten in de Verenigde Staten, bleef onze handleiding over het deelnemen aan een protest een van de populairste van het jaar, dus we hebben ervoor gezorgd dat onze vertalingen up-to-date waren. (Her)leer alles wat u moet weten over encryptie. We zijn begonnen...
In at least a dozen states, lawmakers believe they can pass laws that prohibit young people from accessing social media, or that require them to obtain parental consent before logging in. Fortunately, almost all courts that have reviewed these laws have ruled that they violate the constitution. It's not just the courts telling these lawmakers they are wrong. The Electronic Frontier Foundation (EFF) has filed briefs with courts across the country over the past year, explaining how these laws violate the freedom of speech of young people, as protected by the First Amendment.
Lawmakers in at least a dozen states believe that they can pass laws blocking young people from social media or require them to get their parentsā permission before logging on. Fortunately, nearly every trial court to review these laws has ruled that they are unconstitutional. Itās not just courts telling these lawmakers they are wrong. EFF has spent the past year filing friend-of-the-court briefs in courts across the country explaining how these laws violate young peopleās First Amendment right