Rina Steenkamp - Privacy en technologie

Weblog

2013

Mei

[Privacy Impact Assessment (PIA) - Introductie, handreiking en vragenlijst | 1-1-2 onder de loep - Een onderzoek naar de opbouw en organisatie van het alarmnummer en de storingen in 2012 | De aanhouder wint - De wereld van Advanced Persistent Threats | Wetsvoorstel aanpak computercriminaliteit | [Wetswijziging i.v.m.] fraudeaanpak door gegevensuitwisselingen en het effectief gebruik van binnnen de overheid bekend zijnde gegevens | Donkere wolk - Continuïteitsrisico's in de cloud]

Privacy self-management and the consent dilemma

[Read more]

Towards a positive theory of privacy law

[Read more]

The EU-U.S. privacy collision - a turn to institutions and procedures

[Read more]

A sober look at national security access to data in the cloud

[Read more]

Distributed denial of service actions and the challenge of civil disobedience on the internet

[Read more]

Law in the boardroom

[Read more]

Who has your back? - Which companies help protect your data from the government?

[Read more]

The economic importance of getting data protection right - protecting privacy, transmitting data, moving commerce

[Read more]

Implications of the European Commission's proposal for a general data protection regulation for business

[Read more]

Using malware analysis to evaluate botnet resilience

[Read more]

Digital surveillance - Why the Snooper's Charter is the wrong approach - A call for targeted and accountable investigatory powers

[Read more]

Insider threat control - Understanding Data Loss Prevention (DLP) and detection by correlating events from multiple sources

[Read more]

Public cloud service agreements - What to expect and what to negotiate

[Read more]

Lets cut through the Bitcoin hype - A hacker-entrepreneur's take

[Read more]

How Google lost the trust of Europe's data protection authorities

[Read more]