Rina Steenkamp - Privacy and technology

Weblog

2012

December

[Anonymisation - managing data protection risk | Appropriate security measures for smart grids | Cybersecurity - The corporate counsel's agenda | Smartphone security checker | Kapersky security bulletin 2012 - The overall statistics for 2012 | Determined adversaries and targeted attacks - The threat from sophisticated, well-resourced attackers | Everything you need to know about the Data Protection Regulation | It's not how much data you have, but how you use it - assessing privacy in the context of consumer data integration | Mobile apps for kids - disclosures still not making the grade | A loophole in data processing - Why the 'legitimate interests' test fails to protect the interests of users and the Regulation needs to be amended | National cyber security framework manual | An inquiry into the culture, practices and ethics of the press | Mobile privacy - Is there an app for that? On smart mobile devices, apps and data protection | Methodology for privacy risk management / Measures for the privacy risk treatment | Security threat report 2013 - New platforms and changing threats | A case study of Eurograbber - How 36 million euros was stolen via malware | Global Internet user survey 2012 | The dangers of surveillance | The hackback debate | Guidance regarding methods for de-identification of protected health information in accordance with theHealth Insurance Portability and Accountability Act (HIPAA) privacy rule | Proactive detection of security incidents - Honeypots | Annual report 2012]

De botsing tussen IE- en privacyrechten - Het einde van het Lycos/Presser-tijdperk

[Lees verder]

Anonimiteit in het strafproces

[Lees verder]

Beveilig apparaten gekoppeld aan internet

[Lees verder]

Veilig op sociale netwerken

[Lees verder]

LJN: BY0215, Hoge Raad , 11/00490

[Lees verder]

Beveiligingsrichtlijnen voor mobiele apparaten

[Lees verder]

CIOT-bevragingen - Proces en rechtmatigheid

[Lees verder]

Research report [DigiNotar]

[Lees verder]

Het cybersecuritybeleid van de toekomst

[Lees verder]

Nationaal crisisplan ICT

[Lees verder]

Het decryptiebevel en het nemo-teneturbeginsel - Nopen ontwikkelingen sinds 2000 tot invoering van een ontsleutelplicht voor verdachten?

[Lees verder]