Rina Steenkamp - Privacy and technology

Weblog

2011

May

["You might also like:" Privacy risks of collaborative filtering | Phonotactic reconstruction of encrypted VoIP conversations - Hookt on fon-iks | Shadow [intellectual property rights] report | A single market for intellectual property rights | The future of cloud computing - Opportunities for European cloud computing beyond 2010 | Advancing cloud computing - what to do now? Priorities for industry and governments | Audit of information technology security included in health information technology standards | WikiLeaks would not qualify to claim federal reporter's privilege in any form | International strategy for cyberspace | Opinion 13/2011 on geolocation services on smart mobile devices | Digital opportunity - A review of intellectual property and growth | Security intelligence report | The story so far - What we know about the business of digital journalism | HTTPi for practical end-to-end web content integrity | ENISA ad hoc working group on national risk management preparedness | Securing personal information | Exposing the lack of privacy in file hosting services | Security of cloud computing, providers study | Security guidance for critical areas of focus in cloud computing v2.1 | Hyper-local, directions-based ranking of places | The Federal Bureau of Investigation's ability to address the national security cyber intrusion threat | Terror, security, and money - balancing the risks, benefits and costs of homeland security | Readers' copyright]

Jurisprudentie

More at... [11/05/28 (NL/01)]

De Hoge Raad bewijst een slechte dienst in high-tech-crimezaak over botnets

More at... [11/05/28 (NL/02)]

Gebruik van horizontale verantwoordingsinformatie

More at... [11/05/28 (NL/03)]

Jurisprudentie

More at... [11/05/20 (NL/01)]

Digitale AgendaNL

More at... [11/05/20 (NL/02)]

Jurisprudentie

More at... [11/05/13 (NL/01)]

Notitie privacybeleid

More at... [11/05/13 (NL/02)]

Handhaven en informeren - resultaten

More at... [11/05/13 (NL/03)]