Rina Steenkamp - Privacy and technology

Weblog

2014

November

[TRUSTe settles FTC charges it deceived consumers through its privacy seal program | Making smart decisions about surveillance - A guide for communities | Catching bandits and only bandits - Privacy-preserving intersection warrants for lawful surveillance | The connected car and privacy - Navigating new data issues | Consumer privacy protection principles - Privacy principles for vehicle technologies and services | The dark alleys of Madison Avenue - Understanding malicious advertisements | Public perceptions of privacy and security in the post-Snowden era | Handcrafted fraud and extortion - Manual account hijacking in the wild | Modifying an off-the-shelf wireless router for PDF ballot tampering | Microsoft Security Intelligence Report - Volume 17 - January through June, 2014 | Case study 1 report - WebRTC | Intelligence legalism and the National Security Agency's civil liberties gap | Data privacy regulation comes of age in Asia | The natural history of Gmail data mining | The best secure messaging tools | Surveillance self-defense - Tips, tools and how-tos for safer online communications | Online privacy, online publicity - Young Canadians in a wired world, phase III | Who cares for identity information in Government 2.0? An empirical study | What do users want from their future means of Identity Management? | Removing roadblocks to intelligent vehicles and driverless cars | Riding with the stars - passenger privacy in the NYC taxicab dataset | Dutch e-voting opportunities, Risk assessment framework based on attacker resources | An administrator's guide to internet password research | Q&A - Electronic Identification and Trust Services (eIDAS) Regulation | In the picture - A data protection code of practice for surveillance cameras and personal information | Online harassment | The trouble with European data protection law | Printer watermark obfuscation]

Actieplan Privacy - Eindrapportage

[Lees verder]

Rapport privacy impact assessment gemeentelijke 3D informatiehuishouding

[Lees verder]

ECLI:NL:GHARL:2014:8585

[Lees verder]

Inspiratie Informatieveiligheid

[Lees verder]

Tem de robotauto - De zelfsturende auto voor publieke doelen

[Lees verder]

Basisregistraties vanuit het perspectief van de burger, fraudebestrijding en governance

[Lees verder]

Adequate rechtsbescherming bij grondrechtenbeperkend overheidsingrijpen

[Lees verder]

Dit geef je allemaal prijs als je inlogt op een openbaar wifi-netwerk

[Lees verder]

ECLI:NL:RBAMS:2014:6118

[Lees verder]