Rina Steenkamp - Privacy and technology

Weblog

2012

October

[Annual incident reports 2011 - Analysis of the Article 13a reports of 2011 | Consumerization of IT - top risks and opportunities | Report on the data protection guidance we gave schools in 2012 | Microsoft security intelligence report | 2012 Norton cybercrime report | Deanonymizing mobility traces - using social networks as a side-channel | Opinion 08/2012 providing further input on the data protection reform discussions | Why the right to data portability likely reduces consumer welfare - antitrust and privacy critique | Privacy and progress in whole genome sequencing | Mobile device location data - Additional federal actions could help protect consumer privacy | Before we knew it - An empirical study of zero-day attacks in the real world | Towards a trusted and sustainable European federated eID system | Internet as data source - Feasibility study on statistical methods on internet as a source of data gathering | IBM X-Force 2012 mid-year trend and risk report | PlaceRaider - Virtual theft in physical spaces with smartphones | Unleashing the potential of cloud computing in Europe | Guidance on the use of cloud computing | The right to be forgotten across the pond | The state of risk-based security management]

Kroniek Technologie en recht

[Lees verder]

Slim bekeken - camerabewaking op maat

[Lees verder]

Benchmark digitale dienstverlening 2012 - Status digitale dienstverlening Nederlandse gemeenten vergeleken

[Lees verder]

Cloud diensten in hoger onderwijs en onderzoek en de USA Patriot Act

[Lees verder]

IT-geschillen in de praktijk

[Lees verder]

Terughacken maakt meer kapot dan me lief is...

[Lees verder]

LJN: BX8370, Rechtbank Zwolle , 201017 / KZ ZA 12-147

[Lees verder]

LJN: BX8644, Raad van State , 201205423/1/A3

[Lees verder]

Wijziging van artikel 13 Grondwet

[Lees verder]

Project X Haren - wat ging er mis?

[Lees verder]

Veilig beheer van digitale certificaten

[Lees verder]