Rina Steenkamp - Privacy en technologie

Weblog

2013

Februari

[Meldplicht inbreuken gekwalificeerde certificaten | Kamerbrief stand van zaken uitrol slimme meters | Brief inzake stand van zaken onderhandelingen verordening en richtlijn gegevensbescherming | Misdaad en opsporing in de wolken - Knelpunten en kansen van cloud computing voor de Nederlandse opsporing | Kamerbrief met actualisatie Digitale Agenda.nl | Samenhang regels gebruik persoonsgegevens | Softwareversies van gemeentelijke websystemen in kaart gebracht | Consultatie wijziging artikel 13 Grondwet]

Richtsnoeren beveiliging van persoonsgegevens

Op 19 februari publiceerde het CBP de richtsnoeren beveiliging van persoonsgegevens. Ik ben de hoofdauteur van deze richtsnoeren. Zie mijn CV voor meer informatie.

[Lees verder]

Proposed new EU General Data Protection Regulation - Article-by-article analysis paper

[Read more]

The European data protection reform in the light of cloud computing

[Read more]

Critical cloud computing - a [critical information infrastructure protection (CIIP)] perspective on cloud computing services

[Read more]

An executive's guide to data breach trends in 2012

[Read more]

[Fifth interim report on a national study of credit report accuracy]

[Read more]

EU Cybersecurity plan to protect open internet and online freedom and opportunity

[Read more]

Improving critical infrastructure cybersecurity

[Read more]

The proposed General Data Protection Regulation - The consistency mechanism explained

[Read more]

Corporate tax 2.0 - Why France and the world need a new tax system for the digital age

[Read more]

PCI DSS Cloud computing guidelines

[Read more]

Data protection - The super-brief guide to the proposed Regulation

[Read more]

Working document 01/2013 - Input on the proposed implementing acts

[Read more]

How will surveillance and privacy technologies impact on the psychological notions of identity?

[Read more]

Security engineering - A guide to building dependable distributed systems

[Read more]

How certification systems fail - lessons from the Ware Report

[Read more]

Choosing a hosting provider - 10 questions to ask your provider

[Read more]

Mobile privacy disclosures - building trust through transparency

[Read more]

EU kids online

[Read more]

Privacy by design and third party access to customer energy usage data

[Read more]

Identity assurance - enabling trusted transactions

[Read more]

Privacy Amendment (Enhancing Privacy Protection) Bill 2012

[Read more]

Corruption, proportionality and the prosecution of Aaron Swartz

[Read more]

The draft EU General Data Protection Regulation - costs and paradoxes of explicit consent

[Read more]

Social Media - Consumer compliance risk management guidance

[Read more]

Cloud computing security considerations

[Read more]