Rina Steenkamp - Privacy and technology

Weblog

2013

March

[Unique in the crowd - The privacy bounds of human mobility | Discrimination in online ad delivery | Additional EDPS comments on the data protection reform package | The functions, powers and resources of the Information Commissioner | Assessment notices under de Data Protection Act 1998 - Extension of the Information Commissioner's powers | The Tallinn manual on the international law applicable to cyber warfare | Bound to fail - Why cyber security risk cannot simply be 'managed' away | Bound to fail - Why cyber security risk cannot simply be 'managed' away | Opinion 02/2013 on apps on smart devices | Using smartphones as a proxy for forensic evidence contained in cloud storage services | Silent listeners - The evolution of privacy and disclosure on Facebook | Everything we know about what data brokers know about you | Google, Facebook, Amazon, eBay - Is the internet driving competition or market monopolization? | Technology and the sovereignty of the individual | [Serious and Organised Crime Threat Assessment (SOCTA)] 2013 - Public version | Internet bad neighborhoods | Hacking appliances - Ironic exploits in security products | How bad is it? - A branching activity model to estimate the impact of information security breaches | The implausibility of secrecy | The web won't be safe or secure until we break it | Private traits and attributes are predictable from digital records of human behavior | Data protection in Europe | Paper, plastic... or mobile? An FTC workshop on mobile payments | Cyber-attacks - a new edge for old weapons | Stuxnet 0.5 - The missing link | Bring your own device (BYOD) | 2012 Data mining report to Congress | Quantifying the invisible audience in social networks | What privacy is for | Reforming the data protection package | Big data and analytics - seeking foundations for effective privacy guidance | Consumer Sentinel Network data book for January - December 2012 | Cybersecurity of smart grids | Opinion on [whether a hyperlink to content can be considered a communication to the public] | International compendium of data privacy laws | [Summary of the feedback on cybersecurity legislation from 'Fortune 500' companies] | Ransomware - next-generation fake antivirus | 2013 State of the endpoint | 2013 Cisco annual security report | Global audit committee survey | The UK cyber security strategy - Landscape review]

LJN: BY9718, Hoge Raad , 11/03980

[Lees verder]

Nationaal dreigingsbeeld 2012 - Georganiseerde criminaliteit

[Lees verder]

Juridische scan openbrononderzoek

[Lees verder]

LJN: BZ0644, Gerechtshof Arnhem, 200.111.660

[Lees verder]

Een meewerkverplichting bij grootschalig DNA-onderzoek in strafzaken?

[Lees verder]

Privacy, technologie en de wet - Big Data voor iedereen door goed design

[Lees verder]

Opsporing 2.0 - Met massa meer massa

[Lees verder]

BY9910, Raad van State, 201112022/1/A3

[Lees verder]

Privacy Impact Assessment ANPR

[Lees verder]

DNA in de databank - de moeite waard?

[Lees verder]

LJN: BZ2126, Rechtbank 's-Hertogenbosch, 252880 / EX RK 12-184

[Lees verder]

Reconstructie - Hoe het digitale 'broodspoor' naar de jonge hacker leidde

[Lees verder]