{"id":8739,"date":"2024-07-04T10:22:11","date_gmt":"2024-07-04T08:22:11","guid":{"rendered":"https:\/\/s8.tgin.eu\/?p=8739"},"modified":"2024-07-04T11:50:44","modified_gmt":"2024-07-04T09:50:44","slug":"data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses","status":"publish","type":"post","link":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/","title":{"rendered":"Data protection digest 18 Jun &#8211; 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine"},"content":{"rendered":"\n<p><em>In this issue we look at an end-to-end algorithmic audit, Vinted multimillion fine, Meta and Apple AI projects frozen in the EU, the fight against addictive feeds to minors in the US, and the Avanza Bank and Meta Pixel error case.<\/em><\/p>\n\n\n\n<p><em><a href=\"#newslettersignup\">Stay up to date! Sign up to receive our fortnightly digest via email<\/a>.<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">End-to-end algorithmic audit<\/h4>\n\n\n\n<p>The EDPB offers a non-binding auditing methodology for AI systems, specifically focused on impact assessment. A socio-technical, <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2024-06\/ai-auditing_checklist-for-ai-auditing-scores_edpb-spe-programme_en.pdf\">end-to-end algorithmic audit (E2EST\/AA<\/a>), should inspect a system in its actual implementation, processing activity and running context, looking at the specific data used and the data subjects impacted. It is designed to inspect algorithmic systems used in ranking, image recognition and natural language processing. An AI system may be composed of several algorithms, and an AI service or product may include several AI systems.&nbsp;<\/p>\n\n\n\n<p>It is also an iterative process of interaction between the auditors and the development teams. The method provides templates and instructions to guide such interaction, specifying the data inputs that are necessary for auditors to complete the assessment and validate results. In particular, one of them is <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2024-06\/ai-auditing_checklist-for-ai-auditing-scores_edpb-spe-programme_en.pdf\">\u2018Model cards\u2019<\/a> &#8211; documents designed to compile information about the training and testing of AI models, as well as the features and the motivations of a given dataset or algorithmic model.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Vinted fine<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:30% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXfARTW-ujgN0OdH47UvyU_oeDmo7sroGXys0U6paQE_HngB0gVWUhprQfTcH1D5NsMCS1MMlvhbrEBk7f_WiOVJPDsOuXxbOdCsEcvRK1ETu7V2U1NQiDrqQ8hWY6pzHJRF-ABEQ8FWNWHlTMR6KC2NxZK5?key=32872iuQcMlKODmTJYrqSg\" alt=\"\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>The Lithuanian Data Protection Inspectorate VDAI imposed a 2,385,276 euro fine on Vinted, an online second-hand clothing trade and exchange platform. Violations concern <a href=\"https:\/\/vdai.lrv.lt\/lt\/naujienos\/internetine-devetu-drabuziu-prekybos-ir-mainu-platforma-valdanciai-bendrovei-skirta-bauda-pagal-bendraji-duomenu-apsaugos-reglamenta\/\">transparency of information, notification and conditions for the data subject rights<\/a>. VDAI investigated the 2021 and 2022 complaints from applicants forwarded by the French and Polish supervisory authorities regarding the company&#8217;s possible improper implementation of their requests for data deletion, (&#8220;right to be forgotten&#8221;), and the right to access data.<\/p>\n<\/div><\/div>\n\n\n\n<p>In response to the requests, the company stated that it would not take action because the individuals did not detail their requests following Art. 17 of the GDPR. It was also established that to ensure the platform&#8217;s and its users&#8217; safety, the company applied &#8220;shadow blocking&#8221; without individuals knowing about such processing, (and thus unable to exercise other rights established by the GDPR and their remedies). In addition, the company did not take sufficient technical and organisational measures to ensure and to be able to demonstrate that it took, (or reasonably refused to take), steps regarding the right to access the data.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Meta non-compliance under DMA<\/h4>\n\n\n\n<p>The European Commission stated Meta\u2019s \u201cPay or Consent\u201d advertising model failed to comply with the <a href=\"https:\/\/digital-markets-act.ec.europa.eu\/about-dma_en\">Digital Markets Act<\/a>. The binary choice forces users to consent to the combination of their data and fails to provide them with a less personalised but equivalent version of Meta&#8217;s social networks. In response to regulatory changes in the EU, Meta introduced a binary offer whereby EU users have to choose between a subscription for a monthly fee to an ads-free version, or free-of-charge access with personalised ads.<\/p>\n\n\n\n<p>The possible solution would be for users who do not consent to still get access to an equivalent service which uses less of their data. In case of non-compliance, the Commission can impose fines of up to 10% of the gatekeeper&#8217;s total worldwide turnover. Such fines can go up to 20% in the case of repeated infringement. The <a href=\"https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_24_3582\">Commission is also empowered to adopt additional remedies such as obliging a gatekeeper to sell a business or parts of it<\/a> or banning the gatekeeper from acquisitions of additional services.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Non-material damage under the GDPR<\/h4>\n\n\n\n<p>The CJEU has found that the damage caused by a personal data breach is <a href=\"https:\/\/gdprhub.eu\/index.php?title=CJEU_-_Joined_Cases_C%E2%80%91182\/22_and_C%E2%80%91189\/22_-_Scalable_Capital\">not inherently less serious than a physical injury<\/a>. In the related case, a data controller managed a trading application in which a data subject opened accounts and entered personal data to do so. In 2020, their <a href=\"https:\/\/curia.europa.eu\/juris\/document\/document.jsf?text=&amp;docid=287303&amp;pageIndex=0&amp;doclang=en&amp;mode=req&amp;dir=&amp;occ=first&amp;part=1&amp;cid=9875513\">data were seized by third parties<\/a> whose identity and purposes remain unknown.&nbsp;<\/p>\n\n\n\n<p>An individual requesting compensation under the GDPR must prove not only that the infringement occurred but also that the violation caused them harm; this cannot be automatically assumed. In the event of identity theft, as in the above case, the data must have been misused by a third party. Also, determining the damages payable is up to the legal system of each Member State in each given context.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Apple AI delayed in the EU<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:30% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXdOUyewvf5iwPXO8dx71KdMXBY7W0GNBJ2Ia8fZbJqz_yz54nevpaRhk2ZLnWgqolQZIa46DKtm7epk0NAj-FyTGFySqZSTFYRqeCg5pMFQwPp3OTrOFNAHoDT1O2jWZOwotMfS6tuD8sEaM8Uh8kq27uDE?key=32872iuQcMlKODmTJYrqSg\" alt=\"\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>Apple decided to delay the release of three new AI features in Europe due to EU competition regulations requiring competing goods and services to be compatible with its devices. The company is concerned that to meet the interoperability requirements of the Digital Market Act, it may be <a href=\"https:\/\/www.theguardian.com\/technology\/article\/2024\/jun\/21\/apple-ai-europe-regulation\">required to make compromises to the integrity of its devices that endanger user privacy and data security.<\/a> The features will debut in the US this autumn, but they won&#8217;t make it to Europe until 2025.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">More legal updates<\/h4>\n\n\n\n<p><strong>US privacy legislation:<\/strong> On July 1, the Florida Digital Bill of Rights, Oregon Consumer Privacy Act, and Texas Data Security and Privacy Act entered into effect, joining California, Colorado, Connecticut, Virginia, and Utah. Among many things, they guarantee <a href=\"https:\/\/www.jdsupra.com\/legalnews\/next-wave-of-u-s-state-data-privacy-7713500\/\">consumers rights to access, correct, delete, and opt out of the sale<\/a> of their data concerning targeted advertising, and certain profiling. There are also provisions relating to data minimisation, children\u2019s data, sensitive data consent, biometric data, and impact assessments.&nbsp;<\/p>\n\n\n\n<p><strong>Foreign adversaries: <\/strong>On June 23,&nbsp; <a href=\"https:\/\/digitalpolicyalert.org\/event\/20913-implemented-protecting-americans-data-from-foreign-adversaries-act-of-2024\">the Protecting American&#8217;s Data from Foreign Adversaries<\/a> Act of 2024 entered into effect. It makes it unlawful for a data broker to sell, license, rent, trade, transfer, release, disclose, or otherwise make available specified personally identifiable sensitive data of individuals who reside in the US to North Korea, China, Russia, Iran or an entity controlled by those countries. <a href=\"https:\/\/www.congress.gov\/bill\/118th-congress\/house-bill\/815\">Sensitive data includes<\/a> government-issued identifiers, financial account numbers, biometric information, genetic information, precise geolocation information, and private communications.<\/p>\n\n\n\n<p><strong>Minors\u2019 data:<\/strong> To safeguard children&#8217;s internet privacy, New York State established new laws. <a href=\"https:\/\/www.governor.ny.gov\/news\/governor-hochul-joins-attorney-general-james-and-bill-sponsors-sign-nation-leading-legislation\">The SAFE For Kids Act<\/a> defines operators that offer minors an &#8220;addictive feed&#8221; as a major component of their online or mobile service. <a href=\"https:\/\/www.bbc.com\/future\/article\/20240626-can-a-law-make-social-media-less-addictive\">Addictive feeds<\/a> rely on the user\u2019s past interactions, privacy or accessibility settings related to their device, content displayed or blocked by the user, private communication, search inquiries, chronological order etc. The other piece of legislation &#8211; <a href=\"https:\/\/www.jdsupra.com\/legalnews\/new-york-legislature-passes-a-pair-of-9126383\/\">the Child Data Protection Act<\/a> governs, (GDPR-enhanced), processing obligations of relevant minors\u2019 data by operators, processors and third parties.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">More official guidance<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:20% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXfYCh-6XIXzSgOXKTJMCGlA_Kon2lbxTGGGpqENNEsxFYph1wi6FumnyCnaedOtdJfeqQtE0jmwnAO6HacHgAV7_mw7YpZCXcX__HJ8X03sP5sbHY2_8hZLgs2q3Bzcap6RicS1vkUBePoV6uotje5AOX_c?key=32872iuQcMlKODmTJYrqSg\" alt=\"end-to-end algorithmic audit\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p><strong>Messenger standardised audit:<\/strong> The EDPB offers the <a href=\"https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/support-pool-expert-projects\/standardised-messenger-audit_en\">Standardised Messenger Audit<\/a> initiative to inspect any messenger service used within businesses from a data protection perspective. It consists of two documents &#8211; the <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2024-06\/standardisedmessengeraudit_d1frontend-requirement_edpb-spe-programme_en.pdf\">requirement catalogue<\/a> and the <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2024-06\/standardisedmessengeraudit_d2audit-methodology_edpb-spe-programme_en.pdf\">audit methodology<\/a>. The requirements within this catalogue are formulated in such a way so that a distinction is made between MUST, SHOULD and MAY requirements of the respective data protection principles. It is also closely based on the structure and outline of the GDPR.<\/p>\n<\/div><\/div>\n\n\n\n<p><strong>Data processor:<\/strong> According to the Latvian data protection regulator, for an organisation to be considered a processor, it must meet two basic conditions &#8211; be a separate and independent organisation and process personal data on behalf of the controller. The organisation usually appoints a processor when it needs more knowledge, resources, etc. Finding such a processor would require a feasibility study: <a href=\"https:\/\/www.dvi.gov.lv\/lv\/jaunums\/dviskaidro-kadi-ir-apstradataja-pienakumi-un-tiesibas\">compliance of the set of security requirements<\/a> chosen by the processor with the controller&#8217;s wishes and needs, reputation, and responsibility. Finally, the signing of the agreement indicates the readiness of both parties to cooperate. <a href=\"https:\/\/www.odpa.gg\/information-hub\/guidance\/engaging-processors\/\">Further guidance can be read here<\/a>.<\/p>\n\n\n\n<p><strong>Joint controllership:<\/strong> The Bavarian State Data Protection Commissioner publishes new guidance, (in German), on the <a href=\"https:\/\/www.datenschutz-bayern.de\/infothek\/OH_Gemeinsame_Verantwortlichkeit.pdf\">legal concept where two or more controllers jointly determine the purposes and means of processing<\/a>. The GDPR requires a clear allocation of responsibilities, including where a controller determines the purposes and means of processing jointly with other controllers or where a processing operation is carried out on behalf of a controller. However, joint responsibility may still seem less &#8220;familiar&#8221; than the contractual data processing that has always been established.&nbsp;<\/p>\n\n\n<div id=\"newslettersignup\"><\/div>\n<div id=\"role-block_29ef18c8636cbdf4e2bc7ca36ebda864\" class=\"text-t-black bg-t-pink p-6 md:p-12 rounded-tr-50 rounded-bl-50 mb-4 lg:mb-12 text-center role\">\n  \n      <h2 class=\"text-xl lg:text-2xl max-w-screen-lg mx-auto text-t-black font-display mb-4\">\n      Receive our digest by email    <\/h2>\n        <h3 class=\"text-base max-w-screen-lg mx-auto text-t-black font-body mb-4\">Sign up to receive our digest by email every 2 weeks<\/h3>\n  \n  <div id=\"rmOrganism\">\n    <div class=\"rmEmbed rmLayout--vertical rmBase\">\n      <div data-page-type=\"formSubscribe\" class=\"rmBase__body rmSubscription\">\n                  <form method=\"post\" action=\"https:\/\/mailing.techgdpr.com\/145\/6351\/5e9fc3cdda\/subscribe\/form.html?_g=1698845230\" class=\"rmBase__content\">\n                  <div class=\"rmBase__container mx-auto max-w-screen-sm\">          \n            <div class=\"rmBase__section\">\n              <div class=\"text-left rmBase__el rmBase__el--input rmBase__el--label-pos-none\" data-field=\"email\">\n                <label for=\"email\" class=\"rmBase__compLabel rmBase__compLabel--hideable hidden\">\n                  Email address\n                <\/label>\n                <div class=\"rmBase__compContainer mb-2\">\n                  <input type=\"text\" name=\"email\" id=\"email\" placeholder=\"Email\" value=\"\" class=\"p-4 border rounded border-gray-400 w-full rmBase__comp--input comp__input\">\n                  <div class=\"rmBase__compError text-left font-display font-bold text-xs\"><\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section mb-4\">\n              <div class=\"rmBase__el rmBase__el--consent\" data-field=\"consent_text\">\n                <div class=\"rmBase__comp--checkbox\">\n                  <label for=\"consent_text\" class=\"flex space-x-2 items-baseline text-left vFormCheckbox comp__checkbox\">\n                    <input type=\"checkbox\" value=\"yes\" name=\"consent_text\" id=\"consent_text\" class=\"vFormCheckbox__input\">\n                    <div class=\"vFormCheckbox__indicator hidden\"><\/div>\n                    <div class=\"vFormCheckbox__label\">\n                                              I consent to the processing of my data, and to receiving regular updates from TechGDPR. Data is processed according to our <a href=\"https:\/\/techgdpr.com\/privacy-policy\/\"> Privacy Notice<\/a>.\r\n                                          <\/div>\n                  <\/label>\n                <\/div>\n                <div class=\"rmBase__compError text-left font-display font-bold text-xs\"><\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--cta\">\n                <button type=\"submit\" class=\"inline-flex items-center justify-center px-8 py-3 text-white visited:text-white font-bodybold rounded-md bg-t-navy border-3 border-t-navy hover:border-t-navy hover:bg-transparent hover:text-t-navy transition-all hover:text-white cursor-pointer rmBase__comp--cta\">\n                  Subscribe\n                <\/button>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/form>\n      <\/div>\n      <div data-page-type=\"pageSubscribeSuccess\" class=\"rmBase__body rmSubscription hidden\">\n        <div class=\"rmBase__content\">\n          <div class=\"rmBase__container\">\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--heading\">\n                <div class=\"rmBase__comp--heading\">\n                  Thank you for your subscription!\n      <!-- this linebreak is important, don't remove it! this will force trailing linebreaks to be displayed -->\n                  <br>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--text\">\n                <div class=\"rmBase__comp--text\">\n                  We have sent you an email &#8211; please confirm your email address by clicking the activation link in it.\n      <!-- this linebreak is important, don't remove it! this will force trailing linebreaks to be displayed -->\n                  <br>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n\n      <script src=\"https:\/\/mailing.techgdpr.com\/form\/145\/6069\/8a53c9178b\/embedded.js\" async><\/script>\n  \n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">DPOs getting into small business<\/h4>\n\n\n\n<p>The Data Protection Officer is a<a href=\"https:\/\/cnil.fr\/fr\/observatoire-dpo-enquete-2024\"> profession that is increasingly represented in small enterprises<\/a>, according to the French data protection regulator CNIL. The regulator came to such a conclusion after a joint survey of 3,625 DPO respondents in the country, including 2,842 internal, 366 shared and 417 external. Certain components, such the age distribution, territorialisation, and contract type, have stabilised, but certain responder characteristics have changed significantly between 2019 and 2024. 57% of respondents now work in structures with fewer than 250 employees, (+19% compared to 2019). Also, 91% are convinced of the social usefulness of the DPO&#8217;s function and profession for the protection of customers&#8217;, users&#8217; and citizens&#8217; personal data.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Digital identity<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:30% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXeipeGrMKAbXpl_z3H_lZn-uTpZEjNbKqLa0boaFVnJI6XTCd48BfrJvaFPYDKDHCTzxWaroMo1oOSeHvyXNTBPyBV96NoPT8UKvFDaQUFaHnD87EJKBXVsQqDMEn-f9MKJcJDasS9_KXYPyzaqbTmp7OUO?key=32872iuQcMlKODmTJYrqSg\" alt=\"\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>The US NIST meanwhile has launched a collaborative project to adapt its <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/63\/4\/ipd\">digital identity guidelines<\/a> to support public <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/06\/nist-launches-collaborative-research-effort-digital-identity-support-secure\">benefits programs<\/a>, such as those designed to help beneficiaries pay for food, housing, medical and other basic living expenses. In response to heightened fraud and related cybersecurity threats during the COVID-19 pandemic, some benefits-administering agencies began to integrate new safeguards such as individual digital accounts and identity verification, also known as identity proofing, into online applications. <\/p>\n<\/div><\/div>\n\n\n\n<p>However, the use of certain approaches, like those reliant upon facial recognition or data brokers, has raised questions about privacy and data security, (and potential biases that disproportionately impact communities of colour and marginalized groups).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Enforcement decisions<\/h4>\n\n\n\n<p><strong>Avanza Bank and Meta Pixel: <\/strong>Sweden&#8217;s privacy regulator fined Avanza Bank AB <a href=\"https:\/\/www.imy.se\/globalassets\/dokument\/beslut\/2024\/beslut-tillsyn-avanza.pdf\">1,3 mln euros for failing to implement security measures<\/a>, leading to the unauthorised transfer of personal data of more than half a million data subjects to Meta by accidentally turning on two functions of the Meta Pixel analytics tool. The controller used Meta Pixel to measure the effectiveness of the bank\u2019s Facebook advertising. Two new functions of the analytics tool, the <a href=\"https:\/\/gdprhub.eu\/index.php?title=IMY_(Sweden)_-_DI-2021-5544_Avanza_Bank\">Automatic Advanced Matching and the Automatic Events<\/a>,(for the recognisable form fields and buttons used on the page), were activated by mistake.&nbsp;<\/p>\n\n\n\n<p><strong>Avast browsing data:<\/strong> The US Federal Trade Commission will require Avast to pay 16,5 million dollars and prohibit the company from <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/06\/ftc-finalizes-order-avast-banning-it-selling-or-licensing-web-browsing-data-advertising-requiring-it\">selling or licensing any web browsing data<\/a> for advertising purposes. The FTC alleged that UK-based Avast Limited, via its Czech subsidiary, unfairly collected consumers\u2019 browsing information through the company\u2019s browser extensions and antivirus software, stored it indefinitely, and sold it without adequate notice and consumer consent.&nbsp;<\/p>\n\n\n\n<p><strong>Car retail software: <\/strong>A cyber outage at a major retail software provider for automobile dealers <a href=\"https:\/\/www.theguardian.com\/technology\/article\/2024\/jun\/21\/cdk-cyber-attack-cars-us-canada\">delayed car sales<\/a> throughout North America, (approx. 15,000 retail locations), the Guardian reports. CDK, which provides different kinds of software to car dealerships, proactively shut down most of its systems but is working to reinstate its services.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Cloud banking security<\/h4>\n\n\n\n<p>In terms of data security, operational continuity, and regulatory compliance, <a href=\"https:\/\/www.dlapiper.com\/en\/insights\/publications\/law-in-tech\/2024\/security-and-governance-in-cloud-banking-the-ecbs-guide-to-cloud-services-outsourcing\">outsourcing cloud services to outside providers entails serious risks<\/a>, according to a new analysis by DLA Piper. One example is financial institutions that retain full operational responsibility even when they <a href=\"https:\/\/techgdpr.com\/blog\/server-location-gdpr\/\">outsource critical services<\/a>. This includes risk management, performance monitoring, and vendor selection. To that end, the EU has established two legal frameworks concerning the provision of cloud and ICT services, (DORA, NIS 2), complementing guidelines issued by the European Central Bank.&nbsp;&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Neuro data processing<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:27% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXfNZXUKg_AwqHbTZsREx4cqfDpfAggzsnM-4WhouylWN4uSvetmLPdXeLsrrKujOtf6RuZVbegmG5rQVleNaboUBM7y_huSKgovHp0aXtecMvDA-mJ6k5jEtWSsJrEVcY9d7oyf0Cyy_7Y8G2J-TuWnF1ay?key=32872iuQcMlKODmTJYrqSg\" alt=\"\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>In addition to privacy and data protection, fundamental rights such as human dignity and physical and mental integrity are jeopardised by certain uses of neuro data, states an EDPS analysis. The use of AI systems may also make technically possible exploitation of neuro data by private entities for workplace or commercial surveillance. <a href=\"https:\/\/www.edps.europa.eu\/data-protection\/our-work\/publications\/techdispatch\/2024-06-03-techdispatch-12024-neurodata_en\">Certain uses of neuro data pose unacceptable risks to fundamental rights and are likely unlawful under EU law<\/a>.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<p>In other cases, mitigating techniques should always include impact assessments, data minimisation, transparency, accuracy, necessity and fairness of processing, local storage of raw data, efficient anonymisation for re-use and analysis, (eg, controlling specific aspects of a videogame, monitoring concentration in educational environments, managing chronic pain by modifying brain activity, etc).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this issue we look at an end-to-end algorithmic audit, Vinted multimillion fine, Meta and Apple AI projects frozen in the EU, the fight against addictive feeds to minors in the US, and the Avanza Bank and Meta Pixel error case. Stay up to date! Sign up to receive our fortnightly digest via email. End-to-end [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":8741,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[94],"tags":[51,110,133,122,89,58,169],"class_list":["post-8739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection-digest","tag-artificial-intelligence","tag-audits","tag-cloud-services","tag-data-subject-access-requests","tag-dpo","tag-gdpr-compliance","tag-online-user-tracking"],"acf":[],"featured_image_urls":{"full":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg",1280,935,false],"thumbnail":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-150x150.jpg",150,150,true],"medium":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-300x219.jpg",300,219,true],"medium_large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-768x561.jpg",640,468,true],"large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-1024x748.jpg",640,468,true],"1536x1536":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg",1280,935,false],"2048x2048":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg",1280,935,false],"image-200-200":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-200x200.jpg",200,200,true]},"post_excerpt_stackable":"<p>In this issue we look at an end-to-end algorithmic audit, Vinted multimillion fine, Meta and Apple AI projects frozen in the EU, the fight against addictive feeds to minors in the US, and the Avanza Bank and Meta Pixel error case. Stay up to date! Sign up to receive our fortnightly digest via email. End-to-end algorithmic audit The EDPB offers a non-binding auditing methodology for AI systems, specifically focused on impact assessment. A socio-technical, end-to-end algorithmic audit (E2EST\/AA), should inspect a system in its actual implementation, processing activity and running context, looking at the specific data used and the data&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/techgdpr.com\/blog\/category\/data-protection-digest\/\" rel=\"category tag\">Data Protection Digest<\/a>","author_info":{"name":"Olya Vasylyk","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"},"comments_num":"0 comments","featured_image_urls_v2":{"full":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg",1280,935,false],"thumbnail":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-150x150.jpg",150,150,true],"medium":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-300x219.jpg",300,219,true],"medium_large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-768x561.jpg",640,468,true],"large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-1024x748.jpg",640,468,true],"1536x1536":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg",1280,935,false],"2048x2048":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg",1280,935,false],"image-200-200":["https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280-200x200.jpg",200,200,true]},"post_excerpt_stackable_v2":"<p>In this issue we look at an end-to-end algorithmic audit, Vinted multimillion fine, Meta and Apple AI projects frozen in the EU, the fight against addictive feeds to minors in the US, and the Avanza Bank and Meta Pixel error case. Stay up to date! Sign up to receive our fortnightly digest via email. End-to-end algorithmic audit The EDPB offers a non-binding auditing methodology for AI systems, specifically focused on impact assessment. A socio-technical, end-to-end algorithmic audit (E2EST\/AA), should inspect a system in its actual implementation, processing activity and running context, looking at the specific data used and the data&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/techgdpr.com\/blog\/category\/data-protection-digest\/\" rel=\"category tag\">Data Protection Digest<\/a>","author_info_v2":{"name":"Olya Vasylyk","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data protection digest 18 Jun - 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine - TechGDPR<\/title>\n<meta name=\"description\" content=\"TechGDPR\u2019s review of the most important data-related stories: end-to-end algorithmic audit, DPOs for small businesses, Vinted fine\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection digest 18 Jun - 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine - TechGDPR\" \/>\n<meta property=\"og:description\" content=\"TechGDPR\u2019s review of the most important data-related stories: end-to-end algorithmic audit, DPOs for small businesses, Vinted fine\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"TechGDPR\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-04T08:22:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-04T09:50:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"935\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Olya Vasylyk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@techgdpr\" \/>\n<meta name=\"twitter:site\" content=\"@techgdpr\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Olya Vasylyk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/\"},\"author\":{\"name\":\"Olya Vasylyk\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/person\\\/07e9c14fd01b25bd2c1907537e8547e8\"},\"headline\":\"Data protection digest 18 Jun &#8211; 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine\",\"datePublished\":\"2024-07-04T08:22:11+00:00\",\"dateModified\":\"2024-07-04T09:50:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/\"},\"wordCount\":1983,\"publisher\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/clothing-3221103_1280.jpg\",\"keywords\":[\"Artificial Intelligence\",\"audits\",\"Cloud services\",\"data subject access requests\",\"dpo\",\"GDPR Compliance\",\"online (user) tracking\"],\"articleSection\":[\"Data Protection Digest\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/\",\"name\":\"Data protection digest 18 Jun - 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine - TechGDPR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/clothing-3221103_1280.jpg\",\"datePublished\":\"2024-07-04T08:22:11+00:00\",\"dateModified\":\"2024-07-04T09:50:44+00:00\",\"description\":\"TechGDPR\u2019s review of the most important data-related stories: end-to-end algorithmic audit, DPOs for small businesses, Vinted fine\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/clothing-3221103_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/clothing-3221103_1280.jpg\",\"width\":1280,\"height\":935,\"caption\":\"end-to-end algorithmic audit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/techgdpr.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection digest 18 Jun &#8211; 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#website\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/\",\"name\":\"TechGDPR\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/techgdpr.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\",\"name\":\"TechGDPR\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/staging.techgdpr.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/TGDPR_logo_500px.png\",\"contentUrl\":\"https:\\\/\\\/staging.techgdpr.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/TGDPR_logo_500px.png\",\"width\":501,\"height\":334,\"caption\":\"TechGDPR\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/techgdpr\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/techgdpr\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/person\\\/07e9c14fd01b25bd2c1907537e8547e8\",\"name\":\"Olya Vasylyk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"contentUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"caption\":\"Olya Vasylyk\"},\"description\":\"Creator and editor of TechGDPR\u2019s weekly Digest. Postgraduate masters Diploma in Data Protection, Digital law and Management. Over a decade Olga previously was a broadcast journalist in Ukraine and France specializing in international affairs.\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/author\\\/olyav\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data protection digest 18 Jun - 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine - TechGDPR","description":"TechGDPR\u2019s review of the most important data-related stories: end-to-end algorithmic audit, DPOs for small businesses, Vinted fine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Data protection digest 18 Jun - 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine - TechGDPR","og_description":"TechGDPR\u2019s review of the most important data-related stories: end-to-end algorithmic audit, DPOs for small businesses, Vinted fine","og_url":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/","og_site_name":"TechGDPR","article_published_time":"2024-07-04T08:22:11+00:00","article_modified_time":"2024-07-04T09:50:44+00:00","og_image":[{"width":1280,"height":935,"url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg","type":"image\/jpeg"}],"author":"Olya Vasylyk","twitter_card":"summary_large_image","twitter_creator":"@techgdpr","twitter_site":"@techgdpr","twitter_misc":{"Written by":"Olya Vasylyk","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/#article","isPartOf":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/"},"author":{"name":"Olya Vasylyk","@id":"https:\/\/techgdpr.com\/#\/schema\/person\/07e9c14fd01b25bd2c1907537e8547e8"},"headline":"Data protection digest 18 Jun &#8211; 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine","datePublished":"2024-07-04T08:22:11+00:00","dateModified":"2024-07-04T09:50:44+00:00","mainEntityOfPage":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/"},"wordCount":1983,"publisher":{"@id":"https:\/\/techgdpr.com\/#organization"},"image":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg","keywords":["Artificial Intelligence","audits","Cloud services","data subject access requests","dpo","GDPR Compliance","online (user) tracking"],"articleSection":["Data Protection Digest"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/","url":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/","name":"Data protection digest 18 Jun - 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine - TechGDPR","isPartOf":{"@id":"https:\/\/techgdpr.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/#primaryimage"},"image":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg","datePublished":"2024-07-04T08:22:11+00:00","dateModified":"2024-07-04T09:50:44+00:00","description":"TechGDPR\u2019s review of the most important data-related stories: end-to-end algorithmic audit, DPOs for small businesses, Vinted fine","breadcrumb":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/#primaryimage","url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg","contentUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2024\/07\/clothing-3221103_1280.jpg","width":1280,"height":935,"caption":"end-to-end algorithmic audit"},{"@type":"BreadcrumbList","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-04072024-end-to-end-algorithmic-audit-vinted-fine-dpo-for-small-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techgdpr.com\/"},{"@type":"ListItem","position":2,"name":"Data protection digest 18 Jun &#8211; 2 Jul 2024: end-to-end algorithmic audit, DPOs for small business, Vinted fine"}]},{"@type":"WebSite","@id":"https:\/\/techgdpr.com\/#website","url":"https:\/\/techgdpr.com\/","name":"TechGDPR","description":"","publisher":{"@id":"https:\/\/techgdpr.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techgdpr.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/techgdpr.com\/#organization","name":"TechGDPR","url":"https:\/\/techgdpr.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/#\/schema\/logo\/image\/","url":"https:\/\/staging.techgdpr.com\/wp-content\/uploads\/2018\/04\/TGDPR_logo_500px.png","contentUrl":"https:\/\/staging.techgdpr.com\/wp-content\/uploads\/2018\/04\/TGDPR_logo_500px.png","width":501,"height":334,"caption":"TechGDPR"},"image":{"@id":"https:\/\/techgdpr.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/techgdpr","https:\/\/www.linkedin.com\/company\/techgdpr"]},{"@type":"Person","@id":"https:\/\/techgdpr.com\/#\/schema\/person\/07e9c14fd01b25bd2c1907537e8547e8","name":"Olya Vasylyk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","contentUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","caption":"Olya Vasylyk"},"description":"Creator and editor of TechGDPR\u2019s weekly Digest. Postgraduate masters Diploma in Data Protection, Digital law and Management. Over a decade Olga previously was a broadcast journalist in Ukraine and France specializing in international affairs.","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"}]}},"_links":{"self":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/8739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/comments?post=8739"}],"version-history":[{"count":10,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/8739\/revisions"}],"predecessor-version":[{"id":8751,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/8739\/revisions\/8751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/media\/8741"}],"wp:attachment":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/media?parent=8739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/categories?post=8739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/tags?post=8739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}