Rina Steenkamp - Privacy en technologie

Weblog

2013

Maart

[LJN: BY9718, Hoge Raad , 11/03980 | Nationaal dreigingsbeeld 2012 - Georganiseerde criminaliteit | Juridische scan openbrononderzoek | LJN: BZ0644, Gerechtshof Arnhem, 200.111.660 | Een meewerkverplichting bij grootschalig DNA-onderzoek in strafzaken? | Privacy, technologie en de wet - Big Data voor iedereen door goed design | Opsporing 2.0 - Met massa meer massa | BY9910, Raad van State, 201112022/1/A3 | Privacy Impact Assessment ANPR | DNA in de databank - de moeite waard? | LJN: BZ2126, Rechtbank 's-Hertogenbosch, 252880 / EX RK 12-184 | Reconstructie - Hoe het digitale 'broodspoor' naar de jonge hacker leidde]

Unique in the crowd - The privacy bounds of human mobility

[Read more]

Discrimination in online ad delivery

[Read more]

Additional EDPS comments on the data protection reform package

[Read more]

The functions, powers and resources of the Information Commissioner

[Read more]

Assessment notices under de Data Protection Act 1998 - Extension of the Information Commissioner's powers

[Read more]

The Tallinn manual on the international law applicable to cyber warfare

[Read more]

Bound to fail - Why cyber security risk cannot simply be 'managed' away

[Read more]

Opinion 02/2013 on apps on smart devices

[Read more]

Using smartphones as a proxy for forensic evidence contained in cloud storage services

[Read more]

Silent listeners - The evolution of privacy and disclosure on Facebook

[Read more]

Everything we know about what data brokers know about you

[Read more]

Google, Facebook, Amazon, eBay - Is the internet driving competition or market monopolization?

[Read more]

Technology and the sovereignty of the individual

[Read more]

[Serious and Organised Crime Threat Assessment (SOCTA)] 2013 - Public version

[Read more]

Internet bad neighborhoods

[Read more]

Hacking appliances - Ironic exploits in security products

[Read more]

How bad is it? - A branching activity model to estimate the impact of information security breaches

[Read more]

The implausibility of secrecy

[Read more]

The web won't be safe or secure until we break it

[Read more]

Private traits and attributes are predictable from digital records of human behavior

[Read more]

Data protection in Europe

[Read more]

Paper, plastic... or mobile? An FTC workshop on mobile payments

[Read more]

Cyber-attacks - a new edge for old weapons

[Read more]

Stuxnet 0.5 - The missing link

[Read more]

Bring your own device (BYOD)

[Read more]

2012 Data mining report to Congress

[Read more]

Quantifying the invisible audience in social networks

[Read more]

What privacy is for

[Read more]

Reforming the data protection package

[Read more]

Big data and analytics - seeking foundations for effective privacy guidance

[Read more]

Consumer Sentinel Network data book for January - December 2012

[Read more]

Cybersecurity of smart grids

[Read more]

Opinion on [whether a hyperlink to content can be considered a communication to the public]

[Read more]

International compendium of data privacy laws

[Read more]

[Summary of the feedback on cybersecurity legislation from 'Fortune 500' companies]

[Read more]

Ransomware - next-generation fake antivirus

[Read more]

2013 State of the endpoint

[Read more]

2013 Cisco annual security report

[Read more]

Global audit committee survey

[Read more]

The UK cyber security strategy - Landscape review

[Read more]