
How do organizations react to compliance risks?
Data Protection & Regulatory Compliance Specialists, Compliance
Maria
Organizations faced with Compliance risks, how should they react? What possibilities does the organization have to act against these risks? What options does the ISO 31000 Risk Management standard recommend? We tell you everything in our article!

The jewel in the crown: Business secrets
Data Protection & Regulatory Compliance Specialists, Compliance
Zaray
Business secrets Law 1/2019, of February 20, Business Secrets Law, considers any information or knowledge to be a business secret, including technological, scientific,... Read more

Investment for energy efficiency projects
E-Renewables
Manuel
Institutions, especially public ones, continue to support and prioritize investment in energy efficiency.

75 million aid for Renewable Energy on the islands
E-Renewables
Manuel
The Government has just approved aid worth €75M for investment in renewable energies in the Canary Islands and the Balearic Islands.

Can the bank block my account for not updating my information?
Data Protection & Regulatory Compliance Specialists, Compliance
Zaray
Banking entities must have sufficient means to prove to the authorities that the measures adopted are appropriate.

Is it necessary to accept cookies?
Data Protection & Regulatory Compliance Specialists, Compliance
Carlos
Do I need to accept cookies from the websites I visit? This is a very common question and one that we want to solve for you today.
- SAP Integration Suite: The key to efficient business integration
- SAP EHS (SAP Environment, Health, and Safety)
- Mass update in SAP
- APP Stock Single Material in SAP
- People Analytics in HR: data for talent management
- ENS and NIS2: key cybersecurity regulations in Spain
- SAP Consultant: a stable, well-paid profession with a future
- Extension of the Birth and Childcare Leave: Key points of Royal Decree-Law 9/2025
- Artificial intelligence, data protection and cybersecurity: allies or risks?
- Today's technological war: the role of cybersecurity as a new face of international conflicts

































