Rina Steenkamp - Privacy en technologie

Weblog

2014

November

[Actieplan Privacy - Eindrapportage | Rapport privacy impact assessment gemeentelijke 3D informatiehuishouding | ECLI:NL:GHARL:2014:8585 | Inspiratie Informatieveiligheid | Tem de robotauto - De zelfsturende auto voor publieke doelen | Basisregistraties vanuit het perspectief van de burger, fraudebestrijding en governance | Adequate rechtsbescherming bij grondrechtenbeperkend overheidsingrijpen | Dit geef je allemaal prijs als je inlogt op een openbaar wifi-netwerk | ECLI:NL:RBAMS:2014:6118 | Vergeet de politiestaat. Welkom in de belastingstaat | Nulmeting privacy & beveiliging primair en voortgezet onderwijs | Resultaten opvragen medisch dossier voor officiële instanties | Big data, big consequences? Een verkenning naar privacy en big data gebruik binnen de opsporing, vervolging en rechtspraak | Een privacyraamwerk voor 'DNS big data'-toepassingen | ECLI:NL:RBOVE:2014:5394]

TRUSTe settles FTC charges it deceived consumers through its privacy seal program

[Read more]

Making smart decisions about surveillance - A guide for communities

[Read more]

Catching bandits and only bandits - Privacy-preserving intersection warrants for lawful surveillance

[Read more]

The connected car and privacy - Navigating new data issues

[Read more]

Consumer privacy protection principles - Privacy principles for vehicle technologies and services

[Read more]

The dark alleys of Madison Avenue - Understanding malicious advertisements

[Read more]

Public perceptions of privacy and security in the post-Snowden era

[Read more]

Handcrafted fraud and extortion - Manual account hijacking in the wild

[Read more]

Modifying an off-the-shelf wireless router for PDF ballot tampering

[Read more]

Microsoft Security Intelligence Report - Volume 17 - January through June, 2014

[Read more]

Case study 1 report - WebRTC

[Read more]

Intelligence legalism and the National Security Agency's civil liberties gap

[Read more]

Data privacy regulation comes of age in Asia

[Read more]

The natural history of Gmail data mining

[Read more]

The best secure messaging tools

[Read more]

Surveillance self-defense - Tips, tools and how-tos for safer online communications

[Read more]

Online privacy, online publicity - Young Canadians in a wired world, phase III

[Read more]

Who cares for identity information in Government 2.0? An empirical study

[Read more]

What do users want from their future means of Identity Management?

[Read more]

Removing roadblocks to intelligent vehicles and driverless cars

[Read more]

Riding with the stars - passenger privacy in the NYC taxicab dataset

[Read more]

Dutch e-voting opportunities, Risk assessment framework based on attacker resources

[Read more]

An administrator's guide to internet password research

[Read more]

Q&A - Electronic Identification and Trust Services (eIDAS) Regulation

[Read more]

In the picture - A data protection code of practice for surveillance cameras and personal information

[Read more]

Online harassment

[Read more]

The trouble with European data protection law

[Read more]

Printer watermark obfuscation

[Read more]