Rina Steenkamp - Privacy and technology

Weblog

2014

March

[Amici Curiae brief [ACLU v. Clapper] | Brief of Amicus Curiae [Riley v. California] | MetaPhone - the sensitivity of telephone metadata | Building privacy into mobile location analytics (MLA) through privacy by design | DeepFace - Closing the gap to human-level performance in face verification | Sometimes in class action settlements plaintiffs gain nothing, but risk everything | How do EU and US privacy regimes compare? | Privacy papers for policy makers 2013 | Are credit monitoring services worth it? | Operation Windigo - The vivisection of a large Linux server-side credential stealing malware campaign | Sophos mobile security threat report | Digital life in 2025 | Drones and targeted killing - defining a European position | [On the use of drones] | Metadata - Piecing together a privacy solution | Constitutional limits on surveillance - Association freedom in the age of data hoarding | I know why you went to the clinic - Risks and realization of HTTPS traffic analysis | Neural signatures of user-centered security - An fMRI study of phishing, and malware warnings | Robotics and the new cyberlaw | Handbook on European data protection law | The legal position and societal effects of security breach notification laws | Comparison of five data-breach bills currently pending in the Senate | The state of privacy 2014 | Meet Jack. Or, what the government could do with all that location data | 2013/2014 Data recovery project for National Association for Information Destruction - Data recovery & security report | Patient identification and matching - Final report | Regulating mass surveillance as privacy pollution - Learning from environmental impact statements]

Hoe groot wordt big data

[Lees verder]

ECLI:NL:GHDHA:2014:412

[Lees verder]

De Wet bewaarplicht telecommunicatiegegevens - Over het bewaren en gebruiken van gegevens over telefoon- en internetverkeer ten behoeve van de opsporing

[Lees verder]