van Daalen, O. The right to encryption: Privacy as preventing unlawful access In: Computer Law & Security Review, vol. 49, 2023. @article{nokey,
title = {The right to encryption: Privacy as preventing unlawful access},
author = {van Daalen, O.},
url = {https://www.sciencedirect.com/science/article/pii/S0267364923000146},
doi = {10.1016/j.clsr.2023.105804},
year = {2023},
date = {2023-05-23},
journal = {Computer Law \& Security Review},
volume = {49},
abstract = {Encryption technologies are a fundamental building block of modern digital infrastructure, but plans to curb these technologies continue to spring up. Even in the European Union, where their application is by now firmly embedded in legislation, lawmakers are again calling for measures which would impact these technologies. One of the most important arguments in this debate are human rights, most notably the rights to privacy and to freedom of expression. And although some authors have in the past explored how encryption technologies support human rights, this connection is not yet firmly grounded in an analysis of European human rights case law. This contribution aims to fill this gap, developing a framework for assessing restrictions of encryption technologies under the rights to privacy and freedom of expression as protected under the European Convention of Human Rights (the Convention) and the Charter of Fundamental rights in the European Union (the Charter). In the first section, the relevant function of encryption technologies, restricting access to information (called confidentiality), is discussed. In the second section, an overview of some governmental policies and practices impacting these technologies is provided. This continues with a discussion of the case law on the rights to privacy, data protection and freedom of expression, arguing that these rights are not only about ensuring lawful access by governments to protected information, but also about preventing unlawful access by others. And because encryption technologies are an important technology to reduce the risk of this unlawful access, it is then proposed that this risk is central to the assessment of governance measures in the field of encryption technologies. The article concludes by recommending that states perform an in-depth assessement of this when proposing new measures, and that courts when reviewing them also place the risk of unlawful access central to the analysis of interference and proportionality.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Encryption technologies are a fundamental building block of modern digital infrastructure, but plans to curb these technologies continue to spring up. Even in the European Union, where their application is by now firmly embedded in legislation, lawmakers are again calling for measures which would impact these technologies. One of the most important arguments in this debate are human rights, most notably the rights to privacy and to freedom of expression. And although some authors have in the past explored how encryption technologies support human rights, this connection is not yet firmly grounded in an analysis of European human rights case law. This contribution aims to fill this gap, developing a framework for assessing restrictions of encryption technologies under the rights to privacy and freedom of expression as protected under the European Convention of Human Rights (the Convention) and the Charter of Fundamental rights in the European Union (the Charter). In the first section, the relevant function of encryption technologies, restricting access to information (called confidentiality), is discussed. In the second section, an overview of some governmental policies and practices impacting these technologies is provided. This continues with a discussion of the case law on the rights to privacy, data protection and freedom of expression, arguing that these rights are not only about ensuring lawful access by governments to protected information, but also about preventing unlawful access by others. And because encryption technologies are an important technology to reduce the risk of this unlawful access, it is then proposed that this risk is central to the assessment of governance measures in the field of encryption technologies. The article concludes by recommending that states perform an in-depth assessement of this when proposing new measures, and that courts when reviewing them also place the risk of unlawful access central to the analysis of interference and proportionality. |
van Daalen, O. Fundamental rights assessment of the framework for detection orders under the CSAM proposal 2023. @techreport{nokey,
title = {Fundamental rights assessment of the framework for detection orders under the CSAM proposal},
author = {van Daalen, O.},
url = {https://www.ivir.nl/csamreport/},
year = {2023},
date = {2023-04-22},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
|
Rucz, M., van Daalen, O., van Hoboken, J. Export control of cybersurveillance items in the new dual-use regulation: The challenges of applying human rights logic to export control In: Computer Law & Security Review, vol. 48, 2023. @article{nokey,
title = {Export control of cybersurveillance items in the new dual-use regulation: The challenges of applying human rights logic to export control},
author = {van Daalen, O. and van Hoboken, J. and Rucz, M.},
doi = {10.1016/j.clsr.2022.105789},
year = {2023},
date = {2023-04-21},
journal = {Computer Law \& Security Review},
volume = {48},
abstract = {In 2021, the Recast Dual-Use Regulation entered into force. The regulation includes a heavily debated new provision on the export control of so-called cybersurveillance items. This provision departs from the traditional logic of export control rules in multiple ways. Most importantly, it positions human rights considerations as an important factor in the export control of a flexible range of technologies. This article explores the operation, implications and challenges of this new human rights-orientated approach to export control of digital surveillance technologies. Taking the definition of cybersurveillance items as a starting point of the analysis, the article draws on surveillance-related case law of the European Court of Human Rights and the Court of Justice of the European Union, to define the potential scope of application of the open-ended cybersurveillance concept of the Regulation. By exploring how this concept maps to technologies often connected with human rights infringements, such as facial recognition, location tracking and open-source intelligence, the article highlights the challenges of applying this new approach and underscores the need for its further development in practice.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
In 2021, the Recast Dual-Use Regulation entered into force. The regulation includes a heavily debated new provision on the export control of so-called cybersurveillance items. This provision departs from the traditional logic of export control rules in multiple ways. Most importantly, it positions human rights considerations as an important factor in the export control of a flexible range of technologies. This article explores the operation, implications and challenges of this new human rights-orientated approach to export control of digital surveillance technologies. Taking the definition of cybersurveillance items as a starting point of the analysis, the article draws on surveillance-related case law of the European Court of Human Rights and the Court of Justice of the European Union, to define the potential scope of application of the open-ended cybersurveillance concept of the Regulation. By exploring how this concept maps to technologies often connected with human rights infringements, such as facial recognition, location tracking and open-source intelligence, the article highlights the challenges of applying this new approach and underscores the need for its further development in practice. |
van Daalen, O. Testimony for PEGA hearing on spyware and fundamental rights In: 2022. @article{nokey,
title = {Testimony for PEGA hearing on spyware and fundamental rights},
author = {van Daalen, O.},
url = {https://www.ivir.nl/testimony_pega/},
year = {2022},
date = {2022-10-27},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
van Daalen, O. Opinie: Leg wettelijk vast dat experts onderzoek mogen doen naar gaten in cyberbeveiliging In: De Volkskrant, 2022. @article{nokey,
title = {Opinie: Leg wettelijk vast dat experts onderzoek mogen doen naar gaten in cyberbeveiliging},
author = {van Daalen, O.},
url = {https://www.volkskrant.nl/columns-opinie/opinie-leg-wettelijk-vast-dat-experts-onderzoek-mogen-doen-naar-gaten-in-cyberbeveiliging~bfa52cbb/},
year = {2022},
date = {2022-10-13},
journal = {De Volkskrant},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
van Daalen, O. In defense of offense: information security research under the right to science In: Computer Law & Security Review, vol. 46, 2022. @article{nokey,
title = {In defense of offense: information security research under the right to science},
author = {van Daalen, O.},
doi = {10.1016/j.clsr.2022.105706},
year = {2022},
date = {2022-07-12},
journal = {Computer Law \& Security Review},
volume = {46},
abstract = {Information security is something you do, not something you have. It's a recurring process of finding weaknesses and fixing them, only for the next weakness to be discovered, and fixed, and so on. Yet, European Union rules in this field are not built around this cycle of making and breaking: doing offensive information security research is not always legal, and doubts about its legality can have a chilling effect. At the same time, the results of such research are sometimes not used to allow others to take defensive measures, but instead are used to attack. In this article, I review whether states have an obligation under the right to science and the right to communications freedom to develop governance which addresses these two issues. I first discuss the characteristics of this cycle of making and breaking. I then discuss the rules in the European Union with regard to this cycle. Then I discuss how the right to science and the right to communications freedom under the European Convention for Human Rights , the EU Charter of Fundamental Rights and the International Covenant on Economic, Social and Cultural Rights apply to this domain. I then conclude that states must recognise a right to research information security vulnerabilities, but that this right comes with a duty of researchers to disclose their findings in a way which strengthens information security.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Information security is something you do, not something you have. It's a recurring process of finding weaknesses and fixing them, only for the next weakness to be discovered, and fixed, and so on. Yet, European Union rules in this field are not built around this cycle of making and breaking: doing offensive information security research is not always legal, and doubts about its legality can have a chilling effect. At the same time, the results of such research are sometimes not used to allow others to take defensive measures, but instead are used to attack. In this article, I review whether states have an obligation under the right to science and the right to communications freedom to develop governance which addresses these two issues. I first discuss the characteristics of this cycle of making and breaking. I then discuss the rules in the European Union with regard to this cycle. Then I discuss how the right to science and the right to communications freedom under the European Convention for Human Rights , the EU Charter of Fundamental Rights and the International Covenant on Economic, Social and Cultural Rights apply to this domain. I then conclude that states must recognise a right to research information security vulnerabilities, but that this right comes with a duty of researchers to disclose their findings in a way which strengthens information security. |
Koot, M., Rucz, M., van Daalen, O., van Hoboken, J. The new rules for export control of cyber-surveillance items in the EU 2021, (Commissioned by the Dutch Ministry of Foreign Affairs.). @techreport{Daalen2021,
title = {The new rules for export control of cyber-surveillance items in the EU},
author = {van Daalen, O. and van Hoboken, J. and Koot, M. and Rucz, M.},
url = {https://www.ivir.nl/publicaties/download/Report-on-cybersurveillance-items.pdf},
year = {2021},
date = {2021-06-17},
urldate = {2021-06-17},
note = {Commissioned by the Dutch Ministry of Foreign Affairs.},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
|
van Daalen, O. Openingssalvo in nieuwe Nederlandse Crypto Wars? In: Mediaforum, vol. 2019, nr. 6, pp. 205, 2020, (Opinie). @article{vanDaalen2020,
title = {Openingssalvo in nieuwe Nederlandse Crypto Wars?},
author = {van Daalen, O.},
url = {https://www.ivir.nl/publicaties/download/Mediaforum_2019_6.pdf},
year = {2020},
date = {2020-01-07},
journal = {Mediaforum},
volume = {2019},
number = {6},
pages = {205},
note = {Opinie},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
van Daalen, O. Justitie toegang geven tot versleutelde chatberichten is geen goed idee In: Trouw, 2019, (Opinie). @article{vanDaalen2019b,
title = {Justitie toegang geven tot versleutelde chatberichten is geen goed idee},
author = {van Daalen, O.},
url = {https://www.trouw.nl/opinie/justitie-toegang-geven-tot-versleutelde-chatberichten-is-geen-goed-idee~bd398447/},
year = {2019},
date = {2019-11-08},
journal = {Trouw},
note = {Opinie},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
van Daalen, O. Óók soft- en hardware die niet uit China komen zijn notoir onveilig. Hacken is het probleem, niet Huawei In: 2019, (Opinie in de Volkskrant). @article{vanDaalen2019,
title = {\'{O}\'{o}k soft- en hardware die niet uit China komen zijn notoir onveilig. Hacken is het probleem, niet Huawei},
author = {van Daalen, O.},
url = {https://www.volkskrant.nl/columns-opinie/ook-soft-en-hardware-die-niet-uit-china-komen-zijn-notoir-onveilig-hacken-is-het-probleem-niet-huawei~b675fc66/},
year = {2019},
date = {2019-05-20},
note = {Opinie in de Volkskrant},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
van Daalen, O. Het privacy-argument tegen de Dopamine Machine In: Privacy & Informatierecht, vol. 2018, nr. 2, pp. 39-41, 2018. @article{vanDaalen2018b,
title = {Het privacy-argument tegen de Dopamine Machine},
author = {van Daalen, O.},
url = {https://www.ivir.nl/publicaties/download/PrivacyInformatie_2018_2.pdf},
year = {2018},
date = {2018-10-12},
journal = {Privacy \& Informatierecht},
volume = {2018},
number = {2},
pages = {39-41},
abstract = {De kinderen van Apple-baas Steve Jobs mochten geen iPad gebruiken. 1 Maar Jobs was niet de enige. Veel techies in Silicon Valley zijn zich bewust van de verslavende effecten van IT \textendash ze hebben de producten namelijk zelf ontwikkeld. En nu steeds meer spijtoptanten oproepen tot regulering van onlinediensten zoals Facebook, vraag ik me af: welke rol kan het privacyrecht daarbij spelen?},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
De kinderen van Apple-baas Steve Jobs mochten geen iPad gebruiken. 1 Maar Jobs was niet de enige. Veel techies in Silicon Valley zijn zich bewust van de verslavende effecten van IT – ze hebben de producten namelijk zelf ontwikkeld. En nu steeds meer spijtoptanten oproepen tot regulering van onlinediensten zoals Facebook, vraag ik me af: welke rol kan het privacyrecht daarbij spelen? |
van Daalen, O. De zeven privacytrends van 2017 In: Mediaforum, vol. 2018, nr. 1, pp. 2-5, 2018. @article{vanDaalen2018,
title = {De zeven privacytrends van 2017},
author = {van Daalen, O.},
url = {https://www.ivir.nl/publicaties/download/Mediaforum_2018_1.pdf},
year = {2018},
date = {2018-03-22},
journal = {Mediaforum},
volume = {2018},
number = {1},
pages = {2-5},
abstract = {Het is drie jaar geleden dat Mediaforum een overzicht van tien privacytrends publiceerde. Toen was de Algemene Verordening Gegevensbescherming (AVG) nog niet aangenomen, lag Snowden nog fris in het geheugen en heette de Autoriteit Persoonsgegevens (AP) nog het College Bescherming Persoonsgegevens. Privacyrecht was ook toen al best belangrijk, maar de aandacht voor dit vakgebied is in de afgelopen jaren behoorlijk gegroeid. Dus laten we de vraag opnieuw stellen: wat is er de afgelopen tijd gebeurd op privacygebied, en vallen daarin grote lijnen te ontwaren?},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Het is drie jaar geleden dat Mediaforum een overzicht van tien privacytrends publiceerde. Toen was de Algemene Verordening Gegevensbescherming (AVG) nog niet aangenomen, lag Snowden nog fris in het geheugen en heette de Autoriteit Persoonsgegevens (AP) nog het College Bescherming Persoonsgegevens. Privacyrecht was ook toen al best belangrijk, maar de aandacht voor dit vakgebied is in de afgelopen jaren behoorlijk gegroeid. Dus laten we de vraag opnieuw stellen: wat is er de afgelopen tijd gebeurd op privacygebied, en vallen daarin grote lijnen te ontwaren? |
van Daalen, O. Over waterfilters en bioscoopschermen: het WIV-voorstel en Tele2/Watson In: Mediaforum, nr. 2, pp. 41, 2017, (Opinie). @article{vanDaalen2017b,
title = {Over waterfilters en bioscoopschermen: het WIV-voorstel en Tele2/Watson},
author = {van Daalen, O.},
url = {https://www.ivir.nl/publicaties/download/Opinie_Mediaforum_2017_2.pdf},
year = {2017},
date = {2017-04-25},
journal = {Mediaforum},
number = {2},
pages = {41},
note = {Opinie},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
van Daalen, O. Annotatie bij Rb. Oost-Brabant 20 juli 2016 (Stichting Privacy Claim / Precent) In: Mediaforum, vol. 2016, nr. 8, pp. 239-240, 2017. @article{vanDaalen2017,
title = {Annotatie bij Rb. Oost-Brabant 20 juli 2016 (Stichting Privacy Claim / Precent)},
author = {van Daalen, O.},
url = {https://www.ivir.nl/publicaties/download/Annotatie_Mf_2016_8.pdf},
year = {2017},
date = {2017-03-10},
journal = {Mediaforum},
volume = {2016},
number = {8},
pages = {239-240},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Eskens, S., van Daalen, O., van Eijk, N. Geheime surveillance en opsporing: Richtsnoeren voor de inrichting van wetgeving Instituut voor Informatierecht 2016. @techreport{Eskens2016b,
title = {Geheime surveillance en opsporing: Richtsnoeren voor de inrichting van wetgeving},
author = {Eskens, S. and van Daalen, O. and van Eijk, N.},
url = {http://www.ivir.nl/publicaties/download/Geheime-surveillance-en-opsporing.pdf},
year = {2016},
date = {2016-11-22},
institution = {Instituut voor Informatierecht},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
|
Eskens, S., van Daalen, O., van Eijk, N. 10 Standards for Oversight and Transparency of National Intelligence Services In: Journal of National Security Law & Policy, vol. 8, nr. 3, pp. 553-594, 2016. @article{Eskens2016,
title = {10 Standards for Oversight and Transparency of National Intelligence Services},
author = {Eskens, S. and van Daalen, O. and van Eijk, N.},
url = {http://jnslp.com/2016/07/25/10-standards-oversight-transparency-national-intelligence-services/
https://www.ivir.nl/publicaties/download/JNSLP_2016_3.pdf},
year = {2016},
date = {2016-09-15},
journal = {Journal of National Security Law \& Policy},
volume = {8},
number = {3},
pages = {553-594},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Angelopoulos, C., Brody, A., Hins, A., Hugenholtz, P., Margoni, T., McGonagle, T., van Daalen, O., van Hoboken, J. Study of fundamental rights limitations for online enforcement through self-regulation 2016, (Study supported by the Open Society Foundations, 96 pp.
). @techreport{,
title = {Study of fundamental rights limitations for online enforcement through self-regulation},
author = {Hins, A. and Hugenholtz, P. and McGonagle, T. and van Daalen, O. and van Hoboken, J. and Angelopoulos, C. and Brody, A. and Margoni, T.},
url = {https://www.ivir.nl/publicaties/download/study_fundamental_rights_limitations.pdf},
year = {2016},
date = {2016-06-16},
note = {Study supported by the Open Society Foundations, 96 pp.
},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
|
van Daalen, O. Het Schrems/Facebook-arrest en de gevolgen voor internationale doorgifte In: Nederlands tijdschrift voor Europees recht, nr. 3, pp. 75-80., 2016. @article{,
title = {Het Schrems/Facebook-arrest en de gevolgen voor internationale doorgifte},
author = {O.L. van Daalen},
url = {http://www.ivir.nl/publicaties/download/1787},
year = {2016},
date = {2016-06-14},
journal = {Nederlands tijdschrift voor Europees recht},
number = {3},
pages = {75-80.},
abstract = {
De overdracht van persoonsgegevens naar de Verenigde Staten vond tot voor kort plaats op basis van de zogenoemde Safe Harbourbeschikking. Het Hof heeft die beschikking een paar maanden geleden ongeldig verklaard. Dit is een uitspraak met serieuze gevolgen voor de doorgifte van persoonsgegevens buiten Europa en voor privacybescherming in het algemeen. Wat is de redenering van het Hof van Justitie en wat zijn de gevolgen?
},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
De overdracht van persoonsgegevens naar de Verenigde Staten vond tot voor kort plaats op basis van de zogenoemde Safe Harbourbeschikking. Het Hof heeft die beschikking een paar maanden geleden ongeldig verklaard. Dit is een uitspraak met serieuze gevolgen voor de doorgifte van persoonsgegevens buiten Europa en voor privacybescherming in het algemeen. Wat is de redenering van het Hof van Justitie en wat zijn de gevolgen?
|
Eskens, S., van Daalen, O., van Eijk, N. Ten standards for oversight and transparency of national intelligence services Instituut voor Informatierecht 2015. @techreport{,
title = {Ten standards for oversight and transparency of national intelligence services},
author = {Eskens, S. and van Daalen, O. and van Eijk, N.},
url = {http://www.ivir.nl/publicaties/download/1591.pdf},
year = {2015},
date = {2015-07-23},
institution = {Instituut voor Informatierecht},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
|
van Daalen, O. Burgers tegen Plasterk: het Nederlandse staartje van de Snowden-saga In: Ars Aequi, nr. 4, pp. 287-293., 2015. @article{,
title = {Burgers tegen Plasterk: het Nederlandse staartje van de Snowden-saga},
author = {O.L. van Daalen},
url = {http://www.ivir.nl/publicaties/download/1535.pdf},
year = {2015},
date = {2015-04-17},
journal = {Ars Aequi},
number = {4},
pages = {287-293.},
abstract = {
De Snowden-onthullingen haalden niet alleen wereldwijd de media en het parlementair debat. Ze leidden zelfs tot een Nederlandse rechtszaak over communicatieprivacy. Een principi\ële rechtszaak over burgerrechtenactivisme, surveillance en politieke intrige, met een verrassende, maar ook teleurstellende uitkomst. Dit moet je weten.
},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
De Snowden-onthullingen haalden niet alleen wereldwijd de media en het parlementair debat. Ze leidden zelfs tot een Nederlandse rechtszaak over communicatieprivacy. Een principiële rechtszaak over burgerrechtenactivisme, surveillance en politieke intrige, met een verrassende, maar ook teleurstellende uitkomst. Dit moet je weten.
|
van Daalen, O. Tien privacytrends van 2014 In: Mediaforum, nr. 2, pp. 50-54., 2015. @article{,
title = {Tien privacytrends van 2014},
author = {O.L. van Daalen},
url = {http://www.ivir.nl/publicaties/download/1533.pdf},
year = {2015},
date = {2015-04-01},
journal = {Mediaforum},
number = {2},
pages = {50-54.},
abstract = {
Het privacyrecht is inmiddels een serieus specialisme met jaarlijks tientallen beschikkingen, vonnissen en richtsnoeren. Een overzicht daarvan is nuttig, maar kan je daarin ook bredere ontwikkelingen ontdekken? Het afgelopen jaar in tien privacytrends.
},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Het privacyrecht is inmiddels een serieus specialisme met jaarlijks tientallen beschikkingen, vonnissen en richtsnoeren. Een overzicht daarvan is nuttig, maar kan je daarin ook bredere ontwikkelingen ontdekken? Het afgelopen jaar in tien privacytrends.
|
van Daalen, O. Bescherm je cliënten tegen de staat, versleutel je mail 2015. @periodical{,
title = {Bescherm je cli\"{e}nten tegen de staat, versleutel je mail},
author = {O.L. van Daalen},
url = {http://www.nrc.nl/handelsblad/van/2014/december/22/bescherm-je-clienten-tegen-de-staat-versleutel-je-1450964},
year = {2015},
date = {2015-01-06},
abstract = {
De AIVD houdt zich niet aan aftapbevoegdheden. Een gezonde dosis paranoia zou advocaten daarom niet misstaan, meent Ot van Daalen.
},
note = {
Opinie in NRC Handelsblad op 22 december 2014.
},
keywords = {},
pubstate = {published},
tppubtype = {periodical}
}
De AIVD houdt zich niet aan aftapbevoegdheden. Een gezonde dosis paranoia zou advocaten daarom niet misstaan, meent Ot van Daalen.
|
van Daalen, O. Consternatie bij de afdeling Vermiste en Gevonden Telefoons 2014. @misc{,
title = {Consternatie bij de afdeling Vermiste en Gevonden Telefoons},
author = {O.L. van Daalen},
url = {http://www.ivir.nl/publicaties/download/Mediaforum_2014_5.pdf},
year = {2014},
date = {2014-05-23},
journal = {Mediaforum},
number = {5},
pages = {133},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
|
Guibault, L., van Daalen, O. Unravelling the myth around open source licences : An analysis from a Dutch and European law perspective T.M.C. Asser Press, The Hague, 2006, ISBN: 9067042145. @book{,
title = {Unravelling the myth around open source licences : An analysis from a Dutch and European law perspective},
author = {L. Guibault and O.L. van Daalen},
url = {http://www.ivir.nl/publicaties/download/767.pdf},
isbn = {9067042145},
year = {2006},
date = {2006-02-01},
publisher = {T.M.C. Asser Press},
address = {The Hague},
series = {Information Technology \& Law series},
abstract = {
This study gives an overview of the current legal situation regarding the use of open source software licences and investigates how the most commonly used open source software licences measure up to Dutch and European law. By its in-depth analysis and clear conclusions, this book contributes to the understanding of this complex field that policy makers, regulators, and academics so crucially require. Taking the provisions of the GNU GPL, the BSD, and the Mozilla Public Licence as examples, it investigates the implications of open source licensing from a private law, copyright law and patent law perspective. It also takes a brief look at the issue of the enforcement of these licences. To facilitate the use and enforcement of open source software licences in Europe, and more particularly in the Netherlands, the authors conclude their study by making a number of recommendations for the adaptation of the licence terms with a view to enhancing their compliance with the legal requirements.
},
note = {
Zie ook de "draft"-versie van dit boek.
},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
This study gives an overview of the current legal situation regarding the use of open source software licences and investigates how the most commonly used open source software licences measure up to Dutch and European law. By its in-depth analysis and clear conclusions, this book contributes to the understanding of this complex field that policy makers, regulators, and academics so crucially require. Taking the provisions of the GNU GPL, the BSD, and the Mozilla Public Licence as examples, it investigates the implications of open source licensing from a private law, copyright law and patent law perspective. It also takes a brief look at the issue of the enforcement of these licences. To facilitate the use and enforcement of open source software licences in Europe, and more particularly in the Netherlands, the authors conclude their study by making a number of recommendations for the adaptation of the licence terms with a view to enhancing their compliance with the legal requirements.
|
Dommering, E., van Daalen, O., van Eijk, N. Zes jaar bestuur en rechtspraak in de telecommunicatiemarkt 2004. @book{,
title = {Zes jaar bestuur en rechtspraak in de telecommunicatiemarkt},
author = {N.A.N.M. van Eijk and E.J. Dommering and O.L. van Daalen},
url = {http://www.ivir.nl/publicaties/download/zesjaarOPTA.pdf},
year = {2004},
date = {2004-01-27},
note = {
Amsterdam: Otto Cramwinckel Uitgever 2003, 109 pp.
ISBN 9075727569.
},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
|
van Daalen, O., van Eechoud, M. Handhaving van intellectuele eigendomrechten 2003. @misc{,
title = {Handhaving van intellectuele eigendomrechten},
author = {M.M.M. van Eechoud and O.L. van Daalen},
url = {http://www.ivir.nl/publicaties/download/972.pdf},
year = {2003},
date = {2003-08-15},
abstract = {
Rapport in opdracht van het Ministerie van Economische Zaken ten behoeve van de ICT-toets 2002. Bijdrage over de stand van wetgeving(sinitiatieven) op wereld- en Europees niveau en in Nederland, Canada, Duitsland, Frankrijk, Japan, Verenigd Koninkrijk, Verenigde Staten en Zweden op het gebied van intellectuele eigendom in de digitale omgeving, m.n. wat betreft auteursrecht, naburige rechten en octrooien op software en bedrijfsmethoden.
},
note = {
In: ICT regulering anno 2002. Reis om de wereld in acht landen en zestien onderwerpen, Tilburg: Centrum voor Bestuur, Recht en Informatisering KUB 2002, p. 45-53.
},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Rapport in opdracht van het Ministerie van Economische Zaken ten behoeve van de ICT-toets 2002. Bijdrage over de stand van wetgeving(sinitiatieven) op wereld- en Europees niveau en in Nederland, Canada, Duitsland, Frankrijk, Japan, Verenigd Koninkrijk, Verenigde Staten en Zweden op het gebied van intellectuele eigendom in de digitale omgeving, m.n. wat betreft auteursrecht, naburige rechten en octrooien op software en bedrijfsmethoden.
|