Rina Steenkamp - Privacy en technologie

Weblog

2012

December

[De botsing tussen IE- en privacyrechten - Het einde van het Lycos/Presser-tijdperk | Anonimiteit in het strafproces | Beveilig apparaten gekoppeld aan internet | Veilig op sociale netwerken | LJN: BY0215, Hoge Raad , 11/00490 | Beveiligingsrichtlijnen voor mobiele apparaten | CIOT-bevragingen - Proces en rechtmatigheid | Research report [DigiNotar] | Het cybersecuritybeleid van de toekomst | Nationaal crisisplan ICT | Het decryptiebevel en het nemo-teneturbeginsel - Nopen ontwikkelingen sinds 2000 tot invoering van een ontsleutelplicht voor verdachten?]

Anonymisation - managing data protection risk

[Read more]

Appropriate security measures for smart grids

[Read more]

Cybersecurity - The corporate counsel's agenda

[Read more]

Smartphone security checker

[Read more]

Kapersky security bulletin 2012 - The overall statistics for 2012

[Read more]

Determined adversaries and targeted attacks - The threat from sophisticated, well-resourced attackers

[Read more]

Everything you need to know about the Data Protection Regulation

[Read more]

It's not how much data you have, but how you use it - assessing privacy in the context of consumer data integration

[Read more]

Mobile apps for kids - disclosures still not making the grade

[Read more]

A loophole in data processing - Why the 'legitimate interests' test fails to protect the interests of users and the Regulation needs to be amended

[Read more]

National cyber security framework manual

[Read more]

An inquiry into the culture, practices and ethics of the press

[Read more]

Mobile privacy - Is there an app for that? On smart mobile devices, apps and data protection

[Read more]

Methodology for privacy risk management / Measures for the privacy risk treatment

[Read more]

Security threat report 2013 - New platforms and changing threats

[Read more]

A case study of Eurograbber - How 36 million euros was stolen via malware

[Read more]

Global Internet user survey 2012

[Read more]

The dangers of surveillance

[Read more]

The hackback debate

[Read more]

Guidance regarding methods for de-identification of protected health information in accordance with theHealth Insurance Portability and Accountability Act (HIPAA) privacy rule

[Read more]

Proactive detection of security incidents - Honeypots

[Read more]

Annual report 2012

[Read more]