Rina Steenkamp - Privacy en technologie

Weblog

2012

Juni

[Nog veel onzekerheden over het recht om te worden vergeten | Bring your own device juridisch bekeken | Beslisboom Cookiewetgeving | LJN BW6517, Centrale Raad van Beroep, 10/957 WWB | LJN BW7454, Centrale Raad van Beroep, 11/1349 AW | LJN BW5596, Gerechtshof Amsterdam, 200.092.495/01 | Verst(r)ikt in het net, Jongeren en online problemen - ervaringen van professionals | Wet en werkelijkheid | Tappen en infiltreren | LJN BW6296, Gerechtshof Leeuwarden, 107.001.948/01]

Outdoing Huxley - forging a high level of data protection for Europe in the brave new digital world

[Read more]

Measuring and predicting anonymity

[Read more]

Digital freedoms in international law - practical steps to protect human rights online

[Read more]

Measuring the cost of cybercrime

[Read more]

Working document [...] with the elements and principles to be found in Processor Binding Corporate Rules

[Read more]

Internet security without law - how service providers create order online

[Read more]

Downtime statistics of current cloud solutions

[Read more]

[O]n the Commission Recommendation on preparations for the roll-out of smart metering systems

[Read more]

Smart metering implementation programme - [...] security risk assessments and audits

[Read more]

From real-time intercepts to stored records - why encryption drives the government to seek access to the cloud

[Read more]

Icebergs in the clouds - the other risks of cloud computing

[Read more]

Opinion 4/2012 on cookie consent exemption

[Read more]

2012 Trust, security and passwords survey

[Read more]

A view of traffic management and other practices resulting in restrictions to the open Internet in Europe

[Read more]

Proposal for a regulation [...] on electronic identification and trust services for electronic transactions in the internal market

[Read more]

Draft Anonymisation code of practice

[Read more]

Gagged, sealed and delivered - reforming ECPA's secret docket

[Read more]

When the government comes knocking, who has your back?

[Read more]

Cookies under control

[Read more]

Guidance on the rules of cookies and similar technologies

[Read more]

Breakthrough silicon scanning discovers backdoor in military chip (DRAFT of 05 March 2012)

[Read more]

McAfee threats report - First quarter 2012

[Read more]

The impact of cybercrime on business

[Read more]

2012 Disaster preparedness survey - global findings

[Read more]

A dual consent approach for x-payments

[Read more]