Rina Steenkamp - Privacy en technologie

Weblog

2013

December

[Onderzoeksresultaten cybercrime - Middenbedrijf onderschat risico's van cybercrime | Hoe zit het met mijn privacy, beste zorgverzekeraar? | Evaluatie Wet op de inlichtingen- en veiligheidsdiensten 2002 - Naar een nieuwe balans tussen bevoegdheden en waarborgen | ECLI:NL:RBOBR:2013:6553 | Van Gasteren I en II - over WO II, het right to be left alone en hubris | Data als betaalmiddel - de nieuwe privacy]

Memorandum Opinion [Klayman et al. v. Obama et al.]

[Read more]

Liberty and security in a changing world

[Read more]

What information do data brokers have on consumers, and how do they use it?

[Read more]

A review of the data broker industry - collection, use and sale of consumer data for marketing purposes

[Read more]

Ten commandments of internet law revisited - basic principles for internet lawyers

[Read more]

Biometrics - friend or foe of privacy?

[Read more]

Cryptography as a service in a cloud computing environment

[Read more]

Privacy-preserving charging for eMobility

[Read more]

Rolling plan for ICT standardisation (2013)

[Read more]

UK cyber security standards - Research report

[Read more]

2013 Information security breaches survey - Technical report

[Read more]

According to the Advocate General [...] the Data Retention Directive is incompatible with the Charter of Fundamental Rights

[Read more]

How these 5 dirtbags radically advanced your digital rights

[Read more]

New documents show how the NSA infers relationships based on mobile location data

[Read more]

The FBI's next generation identification program - Big Brother's ID system?

[Read more]

Chilling effects - NSA surveillance drives U.S. writers to self-censor

[Read more]

"Small" breach, big harm.

[Read more]

View from the precipice - Mobile financial malware

[Read more]

Security threat report 2014 - Smarter, shadier, stealthier malware

[Read more]

ENISA threat landscape 2013 - Overview of current and emerging cyber-threats

[Read more]

How the Bitcoin protocol actually works

[Read more]

Digital evidence, digital investigations and e-disclosure - A guide to forensic readiness for organisations, security advisers and lawyers

[Read more]

Foreign surveillance and human rights

[Read more]

Digital activism and non-violent conflict

[Read more]

Mayority is not enough - Bitcoin mining is vulnerable

[Read more]

Serious security - How to store your users' passwords safely

[Read more]

Security of eGovernment systems

[Read more]

Cloud standards coordination - Final report

[Read more]

Security breach notification chart

[Read more]

Special Eurobarometer 404 - Cyber security

[Read more]

[...] on the functioning of the Safe Harbour from the perspective of EU citizens and companies established in the EU

[Read more]

Problems with the FISC's newly-declassified opinion on bulk collection of internet metadata

[Read more]

Our government has weaponized the internet. Here's how they did it

[Read more]

Eyes wide open

[Read more]

Information resellers - Consumer privacy framework needs to reflect changes in technology and the marketplace

[Read more]

Aiding surveillance - An exploration of how development and humanitarian aid initiatives are enabling surveillance in developing countries

[Read more]

An experiment in hiring discrimination via online social networks

[Read more]

LG Smart TVs logging USB filenames and viewing info to LG servers

[Read more]

Is UK college's RFID chip tracking of pupils an invasion of privacy?

[Read more]

Security certification practice in the EU

[Read more]

Good practice guide for securely deploying governmental clouds

[Read more]