Rina Steenkamp - Privacy and technology

Weblog

2012

November

[Opinion [...] on the Commission's Communication on "Unleashing the potential of Cloud Computing in Europe" | Privacy considerations of online behavioural tracking | The right to be forgotten - between expectations and practice | Supply chain integrity - An overview of the ICT supply chain risks and challenges, and vision for the way forward | A penny for your privacy - An analysis of the reimbursements in privacy infringement procedures | McAfee Threats report - Third quarter 2012 | Malware report - Q3 2012 | Cyber-security - a shared responsibility | Black tulip - Report of the investigation into the DigiNotar Certificate Authority breach | A survey of privacy and security decreasing third-party content on Dutch websites | Virtual currency schemes | Russian Underground 101 | Monitoring hacker forums | Electric subsector cybersecurity risk management process | Electricity subsector cybersecurity capability maturity model (ES-C2M2) | Cybersecurity for state regulators - with sample questions for regulators to ask utilities | Guide for assessing the high-level security requirements in NISTIR 7628, Guidelines for smart grid cyber security | Lifecycle data protection management - A controbution on how to adjust European data protection to the needs of the 21st century | Facing facts - Best practices for common uses of facial recognition technologies | Neighborhood watch - security and privacy analysis of automatic meter reading systems | 2012 Data breach investigations report | Discussion paper - Australian privacy breach notification]

Policeware

[Lees verder]

Cyber Security Awareness - Een onderzoek naar kennis, bewustzijn en gedrag ten aanzien van cyber security

[Lees verder]

E-health dwingt beveiliging af

[Lees verder]

Gegevensuitwisseling door toezichthouders - Onderzoek uitgevoerd in opdracht van het WODC

[Lees verder]

Bruggen slaan - Regeerakkoord VVD - PvdA

[Lees verder]