The youth arm of the Bavarian Red Cross Standby Service @brkbereitschaft@twitter.com keeps , but still manages to instruct its 3.500 young members in first aid measures and more, by using an provided by @gwdg@twitter.com. Read more (text in German) owncloud.com/de/brk-bereitscha

Subscribe to ownCloud monthly, our newsletter about developments in , and all things . In the July issue, we discuss initiatives, boosting efficiency and lessons learned in lockdown. owncloud.com/digitization-init

really can be used without accounts with Google and other commercial providers, but it is quite a bit of work to set up, cautions @inside_digital@twitter.com. One of the easier parts is configuring sync and backup using (text in German) inside-digital.de/ratgeber/sma

work in the crisis has created momentum for . The German govt, in charge of @EUCouncil@twitter.com for the rest of 2020, should use this momentum to both get things done and get things right, argues CEO Tobias Gerlinger (text in German) it-daily.net/it-management/dig

ownCloud 🤝 Compuwave: @ownCloud@twitter.com signs partnership agreement with software distributor @CompuwaveGmbH@twitter.com. We look forward to enable even more organizations to collaborate securely and efficiently at the same time! owncloud.com/owncloud-wins-com

RT @esfdsev@twitter.com

Reminder: On July 1st, 2020 at 6 p.m. CET, @rafbuff@twitter.com Rafael Laguna de la Vera will be presenting @SPRIND@twitter.com and its role in the context of Digital Sovereignty with an Emphasis on and the Sovereign Cloud Stack. Kurt Garloff will provide a tech overview.
Feel free to attend!

🐦🔗: twitter.com/esfdsev/status/127

We are proud as punch to be part of this great project. It enables every Indian to receive, store, upload and share their most important personal documents securely.

RT @digilocker_ind@twitter.com

@digilocker_ind@twitter.com is one of India's biggest Digital Infrastructure initiatives. DigiLocker platform has more than 39.32 Million users and 3.79 Billion issued authentic documents.

🐦🔗: twitter.com/digilocker_ind/sta

RT @digilocker_ind@twitter.com

@digilocker_ind@twitter.com is one of India's biggest Digital Infrastructure initiatives. DigiLocker platform has more than 39.32 Million users and 3.79 Billion issued authentic documents.

🐦🔗: twitter.com/digilocker_ind/sta

Having issues with your IT infrastructure? Rely on your own cloud. Through auditable code, gives you about controlling where your data is and who has access to it. owncloud.com/peace-of-mind-thr

RT @crod@twitter.com

Why I did not know that @Only_Office@twitter.com existed? Just tried it with many word documents we create for Citrix customers and the formatting was all there. Will definitely start using it! Very impressed with it on Linux. And supports @OwnCloud@twitter.com for collaboration.

🐦🔗: twitter.com/crod/status/127725

6. Do you comply with all relevant laws? (7/8)

If a company can prove beyond doubt that it has complete control over its data, then the first big step has been taken. Failure to do so could have serious consequences if regulations are violated.

Show thread

5. How do you collaborate? (6/8)

Naturally, everyone wants to avoid . But there is always data that can not leave the company. A separation between cloud service and internal processes is, therefore, necessary to meet each company’s high standards.

Show thread

4. Who processes your data? (5/8)

If a company has special demands about hardware, network, storage, users, and administration, a provider usually cannot meet these requirements. Therefore, you should demand full access to user protocols and integrate them into your own set-up

Show thread

3. Where is the data stored? (4/8)

In many cases, the risk lies with the company, even though the data is stored with an external provider. Thus, companies should also ensure that the management of keys is carefully supervised. It must always be clear who owns which data.

Show thread

2. What happens with your company data? (3/8)

should provide all the information necessary to meet compliance rules, as risks remain even without a breach of data protection. This is already the case when companies do not know if their data is at risk.

Show thread

1. Who controls the hardware? (2/8)

Anyone commissioning a third party must ensure compliance with – and be able to verify who has access at any time. So make sure that your service level agreements continue to be adhered to after they have been signed.

Show thread
Show more
Mastodon

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!