Rina Steenkamp - Privacy en technologie

Weblog

2011

Oktober

[Jurisprudentie | Staat van de gezondheidszorg 2011 | De (on)mogelijkheden van opsporingstechnologie | Kinderpornografie | Data in publiek-private projecten - juridische aspecten | Regulering van IP-adressen (en andere mogelijke identifiers) | Kinderen en internetrisico's - EU Kids Online onderzoek onder 9-16-jarige internetgebruikers in Nederland | Pas op je portemonnee! Over geld uitgeven in virtuele kinderwerelden | Jurisprudentie | Jurisprudentie | Online community policing | Een wereld te winnen... Sociale media en de politie, een eerste verkenning]

WikiLeaks and the PROTECT-IP Act - A new public-private threat to the internet commons

Lees verder... [11/10/30 (EN/01)]

Facial recognition technology - A survey of policy and implementation issues

Lees verder... [11/10/30 (EN/02)]

Information security - Weakness continue amid new federal efforts to implement requirements

Lees verder... [11/10/30 (EN/03)]

Security pros & "cons" - IT professionals on confidence, confidential data, and today's cyber-cons

Lees verder... [11/10/30 (EN/04)]

PIAF - A privacy impact assessment framework for data protection and privacy rights, Deliverable D1

Lees verder... [11/10/23 (EN/01)]

Securing personal information - a self-assessment tool for organizations

Lees verder... [11/10/23 (EN/02)]

Orientierungshilfe - Cloud computing

Lees verder... [11/10/23 (EN/03)]

Mobile application privacy policy framework

Lees verder... [11/10/23 (EN/04)]

[O]n net neutrality, traffic management and the protection of privacy and personal data

Lees verder... [11/10/16 (EN/01)]

Many failures - a brief history of privacy self-regulation in the United States

Lees verder... [11/10/16 (EN/02)]

To track or 'do not track' - advancing transparency and individual control in online behavioral advertising

Lees verder... [11/10/16 (EN/03)]

Cooperative models for effective public private partnerschips - good practice guide

Lees verder... [11/10/16 (EN/04)]

Best practices for reporting badware URLs

Lees verder... [11/10/16 (EN/05)]

Data mining - DHS needs to improve executive oversight of systems supporting counterterrorism

Lees verder... [11/10/16 (EN/06)]

Guide for conducting risk assessments

Lees verder... [11/10/09 (EN/01)]

Microsoft Security Intelligence Report, volume 10

Lees verder... [11/10/09 (EN/02)]

Six provocations for big data

Lees verder... [11/10/09 (EN/03)]

User perspectives on mobile privacy - Summary of research findings

Lees verder... [11/10/09 (EN/04)]

The limits of tort privacy

Lees verder... [11/10/09 (EN/05)]

Verizon 2011 Payment Card Industry compliance report

Lees verder... [11/10/09 (EN/06)]

Account deactivation and content removal - guiding principles and practices for companies and users

Lees verder... [11/10/09 (EN/07)]

The risk of social engineering on information security - a survey of IT professionals

Lees verder... [11/10/09 (EN/08)]

A call to courage - reclaiming our liberties ten years after 9/11

Lees verder... [11/10/02 (EN/01)]

Cyber security and the UK's national infrastructure

Lees verder... [11/10/02 (EN/02)]

Small business virtualization poll - Global results

Lees verder... [11/10/02 (EN/03)]

The USA PATRIOT Act and the use of cloud services - Q&A

Lees verder... [11/10/02 (EN/04)]

Discussion document - privacy design guidelines for mobile application development

Lees verder... [11/10/02 (EN/05)]

Fostering digital citizenship

Lees verder... [11/10/02 (EN/06)]