Rina Steenkamp - Privacy en technologie

Weblog

2014

Juni

[Karin Spaink - vrijheid van meningsuiting tot het uiterste, alhoewel... | ECLI:NL:RBDHA:2014:6526 | Haalbaarheid van een anoniem misdaadmeldpunt via het Internet | CVIII Technische aspecten van (bedrijfs)spionage, juridische normering en privacy, C verslag van een expertmeeting | Godwin-lezing 2014 - In de Tweede Wereldoorlog hadden we wél wat te verbergen | ECLI:NL:GHARL:2014:4043 | Meting dataretentie - Onderzoek naar de mate van naleving van de wet- en regelgeving]

Syllabus, Riley v. California

[Read more]

Trickle down surveillance

[Read more]

Researchers find and decode the spy tools governments use to hijack phones

[Read more]

[Irish High Court refers Schrems Facebook privacy case to ECJ]

[Read more]

Coginitive disconnect - Understanding Facebook Connect login permissions

[Read more]

Addressing the right to privacy at the United Nations

[Read more]

Data doppelgängers and the uncanny valley of personalization

[Read more]

Big data and innovation, setting the record straight - De-identification does work

[Read more]

EMC privacy index

[Read more]

It's all about the Benjamins - An empirical study on incentivizing users to ignore security advice

[Read more]

Tor is for everyone - why you should use Tor

[Read more]

Open wireless movement

[Read more]

A measurement study of Google Play

[Read more]

Factsheet on the "Right to be Forgotten" ruling (C-131/12)

[Read more]

Judgment of the Court (Fourth Chamber) [...] In Case C-360/13

[Read more]

Law enforcement disclosure report

[Read more]

Consumer's location data - Companies take steps to protect privacy, but practices are inconsistent, and risks may not be clear to consumers

[Read more]

Ars tests Internet surveillance - by spying on an NPR reporter

[Read more]

A crisis of accountability - A global analysis of the impact of the Snowden revelations

[Read more]

Why King George III can encrypt

[Read more]

Alan Westin's privacy homo economicus

[Read more]

Necessary & proportionate - Internationals principles on the application of human rights to communications surveillance - Background and supporting international legal analysis

[Read more]

When enough is enough - location tracking, mosaic theory, and machine learning

[Read more]

The top 5 claims that defenders of the NSA have to stop making to remain credible

[Read more]

Data controllers and data processors - what's the difference?

[Read more]

Business without borders - The importance of cross-border data transfers to global prosperity

[Read more]

Data brokers - A call for transparency and accountability

[Read more]

Privacy advocates warn of 'nightmare' scenario as tech giants consider fitness tracking

[Read more]

Your secret Stingray's no secret anymore - the vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy

[Read more]

Judgement of the Court of 8 April 2014 in joined Cases C-293/12 and C-594/12

[Read more]

U.S. mines personal health data to find the vulnerable in emergencies

[Read more]

Ask Ars - Can I see what information the feds have on my travel?

[Read more]

The Internet with a human face

[Read more]

Privacy under attack - the NSA files revealed new threats to democracy

[Read more]

Freedom and control - Engineering a new paradigm for the digital world

[Read more]

What's the gist? Privacy-preserving aggregation of user profiles

[Read more]

How to protect the most privacy with the least effort - change search engines

[Read more]

Twenty-fifth annual report of the Data Protection Commissioner 2013

[Read more]

Privacy versus government surveillance - where network effects meet public choice

[Read more]

Care Data - the cons

[Read more]

20 years of "online government" 101. Part 1 - progress towards a single online presence

[Read more]