[[On] "A comprehensive approach on personal data protection in the European Union" | The slide from "self-regulation" to corporate censorship | The Federal Trade Commission and privacy - defining enforcement and encouraging the adoption of best practices - version 2.0 | DNA databases and human rights | Lessons learned [on combating Conficker] | A step-by-step approach on how to set up a CSIRT | Reducing systemic cybersecurity risk | Data breach notifications in the EU | Security and resilience in governmental clouds | The impact of eHealth on the quality and safety of health care - a systematic overview | Law, technology and shifting power relations | Global status report on the Governance of Enterprise IT (GEIT) - 2011 | Security threat report 2011 | Measuring bias in "organic" web search | Some skepticism about search neutrality | Piracy is the future of television | Annual report PandaLabs 2010 | Opinion 8/2010 on applicable law | The long arm of EU data protection law: Does the Data Protection Directive apply to processing of personal data of EU citizens by websites worldwide? | Distributed Denial of Service attacks against independent media and human rights sites | The "certificate authority" trust model for SSL: a defective foundation for encrypted web traffic and a legal quagmire | Threat assessment (abridged), Internet facilitated organised crime | The state of the electronic identity market: technologies, infrastructure, services and policies | Monitoring and ensuring compliance with Regulation (EC) 45/2001 | Smartphones: Information security risks, opportunities and recommendations for users | How to shop safely online | Commercial data privacy and innovation in the internet economy: a dynamic policy framework]
An opinion of the EDPS.
EDPS: [On] "A comprehensive approach on personal data protection in the European Union" (PDF)
[Open link in this window | Open link in new window]
Out-law.com: Privacy watchdog urges stronger data protection in EU law review
[Open link in this window | Open link in new window]
A publication by EDRi.
EDRi: The slide from "self-regulation" to corporate censorship (PDF)
[Open link in this window | Open link in new window]
EDRi: EDRi releases on study "The slide from self-regulation to corporate censorship"
[Open link in this window | Open link in new window]
An article by Andrew B. Serwin.
Andrew B. Serwin: The Federal Trade Commission and privacy - defining enforcement and encouraging the adoption of best practices - version 2.0 (SSRN)
[Open link in this window | Open link in new window]
Privacy and Security Source: The Federal Trade Commission and privacy - defining enforcement and encouraging the adoption of best practices v. 2
[Open link in this window | Open link in new window]
A publication by GeneWatch, UK.
GeneWatch, UK: DNA databases and human rights (PDF)
[Open link in this window | Open link in new window]
Council for Responsible Genetics: Introduction and summary of findings
[Open link in this window | Open link in new window]
PrivacyLives: Council for Responsible Genetics - Guide to forensic databases worldwide
[Open link in this window | Open link in new window]
A report by the Conficker Working Group.
Conficker Working Group: Lessons learned [on combating Conficker] (PDF)
[Open link in this window | Open link in new window]
The Register: Conficker Group muses on hits and misses
[Open link in this window | Open link in new window]
DarkReading: Combating Conficker - what worked, what didn't
[Open link in this window | Open link in new window]
An article by Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia and XiaoFeng Wang.
Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia and XiaoFeng Wang: Soundminer - A stealthy and context-aware sound trojan for smartphones (PDF)
[Open link in this window | Open link in new window]
Security.nl: Mobiele malware kaapt gesproken creditcardnummers
[Open link in this window | Open link in new window]
A guide by ENISA.
ENISA: A step-by-step approach on how to set up a CSIRT
[Open link in this window | Open link in new window]
Roger's Security Blog: How to build a CERT
[Open link in this window | Open link in new window]
More at... [11/01/28 (NL/01)]
A report by Peter Sommer and Ian Brown.
Peter Sommer and Ian Brown: Reducing systemic cybersecurity risk (PDF)
[Open link in this window | Open link in new window]
BBC News: Risks of cyber war 'over-hyped' says OECD study
[Open link in this window | Open link in new window]
The BBC News link on Techmeme
[Open link in this window | Open link in new window]
Techdirt: OECD - concept of cyberwar is overhyped
[Open link in this window | Open link in new window]
Blogzilla: Reducing systemic cybersecurity risk
[Open link in this window | Open link in new window]
Tweakers.net: OESO - cyberaanval bij ramp kan 'perfecte storm' opleveren
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Data breach notifications in the EU (PDF)
[Open link in this window | Open link in new window]
ENISA: Data breach notifications in the EU
[Open link in this window | Open link in new window]
Data Protector: Excuse me - do you know about "your" data breach?
[Open link in this window | Open link in new window]
The Register: EU study frowns over data breach notification rules
[Open link in this window | Open link in new window]
Tweakers.net: Providers spreken zorg uit over meldingsplicht datalekken
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Security and resilience in governmental clouds (PDF)
[Open link in this window | Open link in new window]
ENISA: Security and resilience in governmental clouds
[Open link in this window | Open link in new window]
WebWereld: Overheidscloud vergroot risico's op datalekken
[Open link in this window | Open link in new window]
De AutomatiseringGids: Pak 'overheidscloud' Europees aan
[Open link in this window | Open link in new window]
Security.nl: ENISA - Privé-cloud beste oplossing voor de publieke sector
[Open link in this window | Open link in new window]
Tweakers.net: Enisa is kritisch over gebruik clouddiensten door overheid
[Open link in this window | Open link in new window]
A research article by Ashly D. Black, Josip Car, Claudia Pagliari, Chantelle Anandan, Kathrin Cresswell, Tomislav Bokun, Brian McKinstry, Rob Procter, Azeem Majeed, Aziz Sheikh.
Ashly D. Black, Josip Car, Claudia Pagliari, Chantelle Anandan, Kathrin Cresswell, Tomislav Bokun, Brian McKinstry, Rob Procter, Azeem Majeed, Aziz Sheikh: The impact of eHealth on the quality and safety of health care - a systematic overview
[Open link in this window | Open link in new window]
Tweakers.net: 'Geen bewijs voor nut ehealth'
[Open link in this window | Open link in new window]
An article by Bert-Jaap Koops.
Bert-Jaap Koops: Law, technology and shifting power relations (SSRN)
[Open link in this window | Open link in new window]
Weblog law & Technology: Law, technology and shifting power relations
[Open link in this window | Open link in new window]
A report by ISACA.
ISACA: Global status report on the Governance of Enterprise IT (GEIT) - 2011 (PDF)
[Open link in this window | Open link in new window]
ISACA: Global status report on the Governance of Enterprise IT (GEIT) - 2011
[Open link in this window | Open link in new window]
De AutomatiseringGids: 40 procent management wil niet in de cloud
[Open link in this window | Open link in new window]
A report by Sophos.
Sophos: Security threat report 2011 (PDF)
[Open link in this window | Open link in new window]
Naked Security: Sophos report reveals increase in social networking security threats
[Open link in this window | Open link in new window]
An article by Benjamin Edelman and Benjamin Lockwood.
Benjamin Edelman and Benjamin Lockwood: Measuring bias in "organic" web search
[Open link in this window | Open link in new window]
WebWereld: Onderzoek - Google trekt zichzelf voor - update
[Open link in this window | Open link in new window]
Nu.nl: 'Zoekmachines trekken eigen dienst voor'
[Open link in this window | Open link in new window]
Search Engine Land: Study - Google "favors" itself only 19% of the time
[Open link in this window | Open link in new window]
An article by James Grimmelmann.
James Grimmelmann: Some skepticism about search neutrality (PDF)
[Open link in this window | Open link in new window]
Ars Technica: Regulating Google's results? Law prof calls "search neutrality" incoherent
[Open link in this window | Open link in new window]
A whitepaper by Abigail De Kosnik.
Abigail De Kosnik: Piracy is the future of television (PDF)
[Open link in this window | Open link in new window]
MIT: "Piracy is the future of television," whitepaper from the Convergence Culture Consortium
[Open link in this window | Open link in new window]
Eric Diehl: Piracy is the future of television
[Open link in this window | Open link in new window]
An annual threat report by Panda Security.
Panda Security: Annual report PandaLabs 2010 (PDF)
[Open link in this window | Open link in new window]
DarkReading: Report - More than a third of all malware in history was created in 2010
[Open link in this window | Open link in new window]
More at... [11/01/21 (NL/01)]
A WP29 opinion.
WP29: Opinion 8/2010 on applicable law (PDF)
[Open link in this window | Open link in new window]
Out-Law: Data protection watchdogs clarify whose law applies to processing
[Open link in this window | Open link in new window]
IT en Recht: Art. 29 WG over toepasselijk recht
[Open link in this window | Open link in new window]
An article by Lokke Moerel.
Lokke Moerel: The long arm of EU data protection law: Does the Data Protection Directive apply to processing of personal data of EU citizens by websites worldwide? (PDF)
[Open link in this window | Open link in new window]
IT en Recht: Art. 29 WG over toepasselijk recht
[Open link in this window | Open link in new window]
An article by Ethan Zuckerman, Hal Roberts, Ryan McGrady, Jullian York and John Palfrey.
Ethan Zuckerman, Hal Roberts, Ryan McGrady, Jullian York and John Palfrey: Distributed Denial of Service attacks against independent media and human rights sites (PDF)
[Open link in this window | Open link in new window]
Berkman Center for Internet & Society at Harvard University: Report - "Distributed Denial of Service attacks against independent media and human rights sites"
[Open link in this window | Open link in new window]
Security.nl: Statische HTML-sites oplossing voor DDoS-aanvallen
[Open link in this window | Open link in new window]
WebWereld: DDoS-aanvallen bedreigen vrijheid van meningsuiting
[Open link in this window | Open link in new window]
An article by Steven B. Roosa and Stephen Schultze.
Steven B. Roosa and Stephen Schultze: The "certificate authority" trust model for SSL: a defective foundation for encrypted web traffic and a legal quagmire (PDF)
[Open link in this window | Open link in new window]
FtT: The flawed legal architecture of the certificate authority trust model
[Open link in this window | Open link in new window]
A threat assessment by Europol.
Europol: Threat assessment (abridged), Internet facilitated organised crime (PDF)
[Open link in this window | Open link in new window]
De AutomatiseringGids: Europol brengt cybercrime in kaart
[Open link in this window | Open link in new window]
A publication by Toby Stevens, John Elliot, Anssi Hoikkanen, Ioannis Maghiros and Wainer Lusoli.
Toby Stevens, John Elliot, Anssi Hoikkanen, Ioannis Maghiros and Wainer Lusoli: The state of the electronic identity market - technologies, infrastructure, services and policies (PDF)
[Open link in this window | Open link in new window]
The Institute for Prospective Technological Studies: The state of the electronic identity market - technologies, infrastructure, services and policies
[Open link in this window | Open link in new window]
Toby Stevens: The state of the electronic identity market
[Open link in this window | Open link in new window]
A policy paper by the European Data Protection Supervisor (EDPS).
EDPS: Monitoring and ensuring compliance with Regulation (EC) 45/2001 (PDF)
[Open link in this window | Open link in new window]
Privacy Lives: European Data Protection Supervisor releases policy paper outlining new enforcement framework
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Smartphones: Information security risks, opportunities and recommendations for users (PDF)
[Open link in this window | Open link in new window]
ENISA: Security, is there an app for that? EU's cyber-security agency highlights risks and opportunities of smartphones
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: How to shop safely online (PDF)
[Open link in this window | Open link in new window]
ENISA: How to shop safely online
[Open link in this window | Open link in new window]
ENISA: The anatomy of online shopping dissected - new EU agency white paper
[Open link in this window | Open link in new window]
A paper by the Department of Commerce Internet Policy Task Force.
Department of Commerce Internet Policy Task Force: Commercial data privacy and innovation in the internet economy - a dynamic policy framework (PDF)
[Open link in this window | Open link in new window]
Privacy Lives: Commerce releases green paper on privacy
[Open link in this window | Open link in new window]
More at... [11/01/14 (NL/01)]
More at... [11/01/14 (NL/02)]
More at... [11/01/14 (NL/03)]
More at... [11/01/14 (NL/04)]
More at... [11/01/14 (NL/05)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.