March 2010

[The privacy dividend - the business case for investing in proactive privacy protection | The inadvertent disclosure of personal health information through peer-to-peer file sharing programs | Verizon incident sharing metrics framework | Learn more about identity theft | The evidence on DNA retention | State of enterprise security, 2010 | Depicting the UK's fraud landscape | Identity and its verification | The electronic police state | Private lives - a people's inquiry into personal information | Promoting trust in the information society by fostering data protection and privacy | The next steps for the Data Protection Directive | Standardizing privacy notices | Evaluating statistical attacks on personal knowledge questions | Side-channel leaks in web applications]

Jurisprudentie

More at... [10/03/28 (1)]

Jurisprudentie

More at... [10/03/27 (1)]

Nieuws en opinie: bewaarplicht telecommunicatiegegevens, opvragingen CIOT, downloadverbod, evaluatie Wbp en ACTA

More at... [10/03/26 (1)]

Jurisprudentie

More at... [10/03/13 (1)]

Nieuws en opinie: ACTA

More at... [10/03/12 (1)]

Auteursrecht en technische voorzieningen

More at... [10/03/09]

Jurisprudentie

More at... [10/03/08 (1)]

Nieuws en opinie: diverse berichten

More at... [10/03/07 (1)]

Nieuws en opinie: bewaarplicht verkeersgegevens

More at... [10/03/06 (1)]

Nieuws en opinie: ACTA (vervolg)

More at... [10/03/05 (1)]



Creative Commons License

All original content on this website © 2010 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.