{"id":7971,"date":"2022-01-11T15:31:20","date_gmt":"2022-01-11T15:31:20","guid":{"rendered":"https:\/\/dev.strafrecht.de\/cybercrime-it-datenschutz\/"},"modified":"2025-11-18T15:43:37","modified_gmt":"2025-11-18T13:43:37","slug":"cybercrime-it-dataprotection","status":"publish","type":"page","link":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/","title":{"rendered":"Cybercrime, IT &#038; Data Protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7971\" class=\"elementor elementor-7971 elementor-4247\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-70ba194 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"70ba194\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ae069a2\" data-id=\"ae069a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb7a4ac elementor-widget elementor-widget-image\" data-id=\"fb7a4ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1260\" height=\"780\" src=\"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780-1260x780.jpg\" class=\"attachment-landscape-1 size-landscape-1 wp-image-5455\" alt=\"\" srcset=\"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780.jpg 1260w, https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780-300x186.jpg 300w, https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780-1024x634.jpg 1024w, https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780-768x475.jpg 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41122b6\" data-id=\"41122b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b60cd5 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"9b60cd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1580\" height=\"780\" src=\"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2025\/11\/2021_WUP_Website_0336_HiRes-1580x780.jpg\" class=\"attachment-landscape-2 size-landscape-2 wp-image-13090\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-38230dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"38230dc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-55a6342\" data-id=\"55a6342\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-93c7a88 elementor-widget elementor-widget-text-editor\" data-id=\"93c7a88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the digital transformation, the share of computer-supported processes in the company is constantly growing. Work and workplace are increasingly being decoupled by means of communication technology &#8211; remote working is the order of the day, especially in times of pandemic. The downside: There is hardly any other area where immediate risks for the company are realised than in the area of IT and data protection.<\/p><h3>Cybercrime<\/h3><p>Theoretically, every company is exposed to the risk of falling victim to a cyber attack. If hackers paralyse the company&#8217;s IT or hijack data, this not only entails immense costs for restoring the ability to work. If personal data and confidential information of business partners and customers fall into the hands of the perpetrators, the attacked company itself is liable if protection is inadequate.<\/p><p>For companies, protecting themselves against cybercrime is therefore an important component of compliance. If IT compliance regulations are not adhered to, companies are now threatened with severe fines.<\/p><p>Developing prevention programmes against cyber attacks and providing criminal law support in the event of a crisis is a focus of our practice in the area of IT criminal law. In teams of experienced criminal lawyers and IT specialists, we advise corporate management on how to minimise legal and factual risks in the context of cybercrime and initiate compliance investigations that help to identify weaknesses of a technical or organisational nature. ( &gt;&gt; IT Forensics)<\/p><h3>IT Criminal Law &amp; Data Protection<\/h3><p>It is not always large-scale hacker attacks from outside that threaten corporate IT. IT criminal law includes other offences that the legislator has successively included in the Criminal Code, such as spying on data (\u00a7\u00a7 202a-c StGB), computer fraud (\u00a7 263a StGB), data alteration (\u00a7 303a StGB) or computer sabotage (\u00a7 303b StGB). Copyright offences through unauthorised downloads of music and films or fraud on online shopping platforms also fall within the scope of IT criminal law in the broadest sense.<\/p><p>Since the entry into force of the General Data Protection Regulation (GDPR), at the latest, data protection violations have been a particularly serious liability issue for companies. If personal data comes to the attention of third parties without the company collecting the data having taken sufficient security measures and also having documented this, there is now a threat of severe fines.<\/p><p>We support companies in optimising their compliance with regard to IT security and data protection. In doing so, we point out the risk areas and help to sensitise employees to them, for example in the context of internal company training.<\/p><p><span style=\"color: #0090d6;\">Typical topics:<\/span><\/p><ul><li>Hacker attacks through ransomware<\/li><li>Data theft and spying on data<\/li><li>Industrial espionage<\/li><li>IT compliance<\/li><li>Review of IT security guidelines<\/li><li>Breaches of data protection laws<\/li><li>IT forensics<\/li><\/ul><p><span style=\"color: #0090d6;\"><br \/>They can count on us:<\/span><\/p><ul><li>Managing directors<\/li><li>IT and R&amp;D executives<\/li><li>Compliance officers<\/li><li>External consultants<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-fe3d9f4\" data-id=\"fe3d9f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1ee7a0 elementor-grid-1 elementor-posts--thumbnail-top elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-posts\" data-id=\"e1ee7a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;custom_columns&quot;:&quot;1&quot;,&quot;custom_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;custom_columns_tablet&quot;:&quot;2&quot;,&quot;custom_columns_mobile&quot;:&quot;1&quot;,&quot;custom_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;custom_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.custom\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t      <div class=\"ecs-posts elementor-posts-container elementor-posts   elementor-grid elementor-posts--skin-custom\" data-settings=\"{&quot;current_page&quot;:1,&quot;max_num_pages&quot;:0,&quot;load_method&quot;:&quot;&quot;,&quot;widget_id&quot;:&quot;e1ee7a0&quot;,&quot;post_id&quot;:7971,&quot;theme_id&quot;:7971,&quot;change_url&quot;:false,&quot;reinit_js&quot;:false}\">\n      <div class=\"elementor-posts-nothing-found\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a4938c elementor-widget elementor-widget-spacer\" data-id=\"6a4938c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With the digital transformation, the share of computer-supported processes in the company is constantly growing. Work and workplace are increasingly being decoupled by means of communication technology &#8211; remote working is the order of the day, especially in times of pandemic. The downside: There is hardly any other area where immediate risks for the company [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7971","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybercrime, IT &amp; Data Protection - Wessing &amp; Partner<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime, IT &amp; Data Protection\" \/>\n<meta property=\"og:description\" content=\"With the digital transformation, the share of computer-supported processes in the company is constantly growing. Work and workplace are increasingly being decoupled by means of communication technology &#8211; remote working is the order of the day, especially in times of pandemic. The downside: There is hardly any other area where immediate risks for the company [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/\" \/>\n<meta property=\"og:site_name\" content=\"Wessing &amp; Partner\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T13:43:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1260\" \/>\n\t<meta property=\"og:image:height\" content=\"780\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/\",\"url\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/\",\"name\":\"Cybercrime, IT & Data Protection - Wessing &amp; Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.strafrecht.de\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/2021_WUP_Website_0413_1260x780-1260x780.jpg\",\"datePublished\":\"2022-01-11T15:31:20+00:00\",\"dateModified\":\"2025-11-18T13:43:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.strafrecht.de\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/2021_WUP_Website_0413_1260x780-1260x780.jpg\",\"contentUrl\":\"https:\\\/\\\/www.strafrecht.de\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/2021_WUP_Website_0413_1260x780-1260x780.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/cybercrime-it-dataprotection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime, IT &#038; Data Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/\",\"name\":\"Wessing &amp; Partner\",\"description\":\"Strafrecht nach allen Regeln der Kunst.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.strafrecht.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybercrime, IT & Data Protection - Wessing &amp; Partner","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime, IT & Data Protection","og_description":"With the digital transformation, the share of computer-supported processes in the company is constantly growing. Work and workplace are increasingly being decoupled by means of communication technology &#8211; remote working is the order of the day, especially in times of pandemic. The downside: There is hardly any other area where immediate risks for the company [&hellip;]","og_url":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/","og_site_name":"Wessing &amp; Partner","article_modified_time":"2025-11-18T13:43:37+00:00","og_image":[{"width":1260,"height":780,"url":"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/","url":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/","name":"Cybercrime, IT & Data Protection - Wessing &amp; Partner","isPartOf":{"@id":"https:\/\/www.strafrecht.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/#primaryimage"},"image":{"@id":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780-1260x780.jpg","datePublished":"2022-01-11T15:31:20+00:00","dateModified":"2025-11-18T13:43:37+00:00","breadcrumb":{"@id":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/#primaryimage","url":"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780-1260x780.jpg","contentUrl":"https:\/\/www.strafrecht.de\/wp-content\/uploads\/2021\/12\/2021_WUP_Website_0413_1260x780-1260x780.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.strafrecht.de\/en\/cybercrime-it-dataprotection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.strafrecht.de\/en\/"},{"@type":"ListItem","position":2,"name":"Cybercrime, IT &#038; Data Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.strafrecht.de\/en\/#website","url":"https:\/\/www.strafrecht.de\/en\/","name":"Wessing &amp; Partner","description":"Strafrecht nach allen Regeln der Kunst.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.strafrecht.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/pages\/7971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/comments?post=7971"}],"version-history":[{"count":56,"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/pages\/7971\/revisions"}],"predecessor-version":[{"id":13141,"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/pages\/7971\/revisions\/13141"}],"wp:attachment":[{"href":"https:\/\/www.strafrecht.de\/en\/wp-json\/wp\/v2\/media?parent=7971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}