Telekom Logo
  • 2017 Corporate Responsibility Report

Data security and protection

Here is a selection of material topics from the 2017 CR-Report. More information can be found in the chapters Strategy & management and Customers & products.

Protecting personal data

Almost one-third of all Germans are afraid of their data being misused and of insufficient data security in general. These were the findings of the 2016 Security Report that we commissioned from the Allensbach Institute. However, we are by far the most trusted company in the ICT img industry when it comes to handling personal data. And we are proud of it, because protecting our customers' data is one of our top priorities.

We also provide up-to-date information about all of our data protection activities on our Group website at The following are just a few examples of our activities during the reporting period.

Competition on digital data protection tools
At the beginning of 2017, we launched a worldwide idea competition. The competition called on participants to create a privacy bot - an intelligent, digital data protection tool. The bot had to be useful for all sorts of web services, not just aimed at individual providers such as Facebook or travel portals. The award ceremony took place in July in Berlin. A team from Germany was the winner. This team developed a privacy bot that automatically verifies the Privacy Notices of Internet services based on individual preferences specified by the user. The privacy bot also provides a variety of other information relating to data privacy, such the number of data privacy incidents affecting the relevant Internet provider in the past.

There were 12 entries, five of which advanced to the final round, with the top three being awarded prize money. The jury was made up of data privacy experts as well as specialists from the Internet economy and the world of corporate communications. Among its most prominent members was Peter Schaar, former German Federal Commissioner for Data Protection and Freedom of Information.

Mobile protection
According to the 2016 Security Report, about half of smartphone owners in Germany have no software installed on their phone to protect it from cyber attacks. Since November 2017, we have partnered with the company Check Point Software Technologies to offer the Protect Mobile security solution for smartphones to our consumer customers. Protect Mobile detects and wards off cyber attacks in the mobile communications network, before they can even get to the smartphone. This protection is automatically integrated into Deutsche Telekom's mobile communications network. The Protect Mobile app detects additional cyber attacks when browsing the Internet on a WLAN img or using hotspots img as well as when downloading apps, doing online banking or surfing in the browser. Deutsche Telekom customers can add this option on to their existing mobile phone contract. For the most complete protection, the free app is available for Android and IOS from app stores.

Simple data privacy statements for everyone
Data Privacy Notices are often incomprehensible to the layperson. Our one-pager provides our customers with an easy-to-read overview of data privacy at our company. It contains simple, condensed information on the basics behind our data processing activities. It does not replace our formal data privacy statement, to which we link in the document and which complies with legal requirements. Instead, it provides users with transparent information on how and to what extent we process and use personal data. With this one-pager, we have followed an initiative launched by the National IT Summit, supported by the Federal Ministry of Justice and Consumer Protection.

Encryption for all
Together with the Fraunhofer Institute for Secure Information Technology (Fraunhofer SIT), we launched the "Volksverschlüsselung" encryption solution in mid-June 2016. It is a simple, free way to encrypt emails. We operate the solution at a high-security data center. The keys are generated on the user's device. The user is the only person with access to them; they are not sent to the infrastructure operator. To use the encryption, users only need to install the software and identify themselves as part of a simple one-time process. This product supports the federal government's digital agenda.  What's more, we fulfill the requirements of the Charter for the Promotion of Trustworthy Communications (Charta zur Stärkung der vertrauenswürdigen Kommunikation), which was proposed and signed by representatives from the business and scientific communities as well as by political representatives. For more information, go to

Other examples of our comprehensive data security offering

  • Information on cyber criminals, malware and phishing is distributed over thousands of websites on the Internet. The website brings this information together, providing users with easy access to security issues. Young people, adults and businesses can find useful information and specific tips concerning security and data protection.
  • The "Confidential" issue of our We Care magazine talks about how dangerous hacker attacks can be and how users can protect themselves.
  • Users can track cyber attacks on our website in real time using our security dashboard. We show the countries where the cyber attacks are coming from on a map. For more information on this, go to
  • Our Netzgeschichten (Network Stories) also discuss issues regarding protection of minors and consumers. You can watch all of our videos on Youtube: