Rina Steenkamp - Privacy and technology

Weblog

2014

June

[Syllabus, Riley v. California | Trickle down surveillance | Researchers find and decode the spy tools governments use to hijack phones | [Irish High Court refers Schrems Facebook privacy case to ECJ] | Coginitive disconnect - Understanding Facebook Connect login permissions | Addressing the right to privacy at the United Nations | Data doppelgängers and the uncanny valley of personalization | Big data and innovation, setting the record straight - De-identification does work | EMC privacy index | It's all about the Benjamins - An empirical study on incentivizing users to ignore security advice | Tor is for everyone - why you should use Tor | Open wireless movement | A measurement study of Google Play | Factsheet on the "Right to be Forgotten" ruling (C-131/12) | Judgment of the Court (Fourth Chamber) [...] In Case C-360/13 | Law enforcement disclosure report | Consumer's location data - Companies take steps to protect privacy, but practices are inconsistent, and risks may not be clear to consumers | Ars tests Internet surveillance - by spying on an NPR reporter | A crisis of accountability - A global analysis of the impact of the Snowden revelations | Why King George III can encrypt | Alan Westin's privacy homo economicus | Necessary & proportionate - Internationals principles on the application of human rights to communications surveillance - Background and supporting international legal analysis | When enough is enough - location tracking, mosaic theory, and machine learning | The top 5 claims that defenders of the NSA have to stop making to remain credible | Data controllers and data processors - what's the difference? | Business without borders - The importance of cross-border data transfers to global prosperity | Data brokers - A call for transparency and accountability | Privacy advocates warn of 'nightmare' scenario as tech giants consider fitness tracking | Your secret Stingray's no secret anymore - the vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy | Judgement of the Court of 8 April 2014 in joined Cases C-293/12 and C-594/12 | U.S. mines personal health data to find the vulnerable in emergencies | Ask Ars - Can I see what information the feds have on my travel? | The Internet with a human face | Privacy under attack - the NSA files revealed new threats to democracy | Freedom and control - Engineering a new paradigm for the digital world | What's the gist? Privacy-preserving aggregation of user profiles | How to protect the most privacy with the least effort - change search engines | Twenty-fifth annual report of the Data Protection Commissioner 2013 | Privacy versus government surveillance - where network effects meet public choice | Care Data - the cons | 20 years of "online government" 101. Part 1 - progress towards a single online presence]

Karin Spaink - vrijheid van meningsuiting tot het uiterste, alhoewel...

[Lees verder]

ECLI:NL:RBDHA:2014:6526

[Lees verder]

Haalbaarheid van een anoniem misdaadmeldpunt via het Internet

[Lees verder]

CVIII Technische aspecten van (bedrijfs)spionage, juridische normering en privacy, C verslag van een expertmeeting

[Lees verder]

Godwin-lezing 2014 - In de Tweede Wereldoorlog hadden we wél wat te verbergen

[Lees verder]

ECLI:NL:GHARL:2014:4043

[Lees verder]

Meting dataretentie - Onderzoek naar de mate van naleving van de wet- en regelgeving

[Lees verder]