Publications
Top Keywords
- Art. 10 EVRM (25)
- Art. 17 CDSM Directive (13)
- Artificial intelligence (72)
- Big data (12)
- Constitutional and administrative law (11)
- Consumer law (11)
- Content moderation (22)
- Copyright (188)
- Cybersecurity (10)
- Data protection (29)
- Data protection law (11)
- Digital Services Act (DSA) (32)
- Digital Single Market (13)
- EU (19)
- EU law (26)
- Europe (12)
- European Union (10)
- Fake news (14)
- Freedom of expression (46)
- Fundamental rights (18)
- GDPR (22)
- Human rights (31)
- Intellectual property (29)
- Internet (24)
- Journalism (15)
- Kluwer Information Law Series (43)
- Licensing (13)
- Media law (28)
- Online platforms (19)
- Patent law (20)
- Personal data (35)
- Platforms (24)
- Privacy (326)
- Regulation (11)
- Social media (11)
- Software (10)
- Surveillance (11)
- Text and Data Mining (TDM) (20)
- Trademark law (13)
- Transparency (19)
Any Colour You Like: the History (and Future?) of E.U. Communications Security Policy external link
Abstract
This descriptive legal analysis maps and evaluates a four decade legacy of communications security conceptualizations in E.U. law and policy, including four legislative proposals launched in 2013. As the first comprehensive historical analysis of its kind, the paper forwards a range of new scientific contributions in a time secure electronic communications are of historically unparalleled societal, economic and political relevance. Five communications security policy cycles are identified, and their ‘security’ definitions and scope are described. These cycles are: network and information security, data protection, telecommunications, encryption and cybercrime. An evaluation of the current E.U. ‘security’ conceptualizations illuminates the underlying values at stake, the protection offered in current regulations, the formulation of six research themes and an agenda for computer science, political theory and legal research. Despite constitutional values at stake such as privacy and communications freedom and a robust computer science literature, the paper observes a deep lack of conceptual clarity and coherence in E.U. security policymaking. It then concludes that the observed conceptual ambiguity has allowed powerful stakeholders to capture, or paint E.U. network and information security policies in any colour they like.
Constitutional and administrative law, Cybersecurity, Data protection, encryption, EU law, network and information security, securitization, Technologie en recht, the c.i.a.-triad
RIS
Bibtex
Waarde verlenging 2,1 GHz-vergunningen: Onderzoek naar de mogelijkheden voor hergebruik van de methodiek uit het rapport ‘Waarde verlenging mobiele vergunningen external link
Abstract
In 2012 hebben SEO Economisch Onderzoek en het Instituut voor Informatierecht (IViR) een methodiek ontwikkeld om uit de uitkomst van de multibandveiling een prijs te berekenen voor tijdelijke verlenging van de vergunningen in de 900 en 1800 MHz-band. In die multibandveiling is onder andere 2×10 MHz spectrum geveild in de 2,1 GHz-band. Het ministerie van Economische Zaken heeft het IViR gevraagd in hoeverre de eerder ontwikkelde methodiek, en daarmee samenhangend de informatie over geboden prijzen toen, de basis kunnen vormen voor een verlengingsprijs in geval de 2,1 GHz-vergunningen tijdelijk worden verlengd. Deze notitie geeft antwoord op die vraag.
Zie ook: http://www.internetconsultatie.nl/ontwerpbesluit_verlengbaarheid_2100mhz_vergunningen
Telecommunicatierecht
RIS
Bibtex
Annotatie bij Hoge Raad 7 maart 2014 external link
Abstract
Klacht over een column in NJB van een Advocaat-Generaal bij de Hoge Raad, redacteur van NJB, over mensenrechtschendingen in Rusland in verband met de onteigening van het olieconcern Yukos. Deze column zou de onafhankelijkheid van de rechterlijke macht schaden, omdat over deze onteigeningen ten tijde van de column procedures in Nederland liepen. De klacht op grond van artikel 13a RO wordt afgewezen, omdat dit een te vergaande beperking van de vrijheid van meningsuiting van een lid van de rechterlijke macht zou zijn.
Grondrechten, Vrijheid van meningsuiting
RIS
Bibtex
‘Ontmoeting en debat’: Bibliotheekwet versus Auteurswet in het digitale domein external link
Stortvloed regels moet beveiliging internet verbeteren external link
Security Collapse in the HTTPS Market external link
Abstract
HTTPS (Hypertext Transfer Protocol Secure) has evolved into the de facto standard for secure Web browsing. However, widely reported security incidents—such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed—have exposed systemic security vulnerabilities of HTTPS to a global audience. The Edward Snowden revelations—notably around operation BULLRUN, MUSCULAR, and the lesser-known FLYING PIG program to query certificate metadata on a dragnet scale—have driven the point home that HTTPS is both a major target of government hacking and eavesdropping, as well as an effective measure against dragnet content surveillance when Internet traffic traverses global networks. HTTPS, in short, is an absolutely critical but fundamentally flawed cybersecurity technology.
To evaluate both legal and technological solutions to augment the security of HTTPS, our article argues that an understanding of the economic incentives of the stakeholders in the HTTPS ecosystem, most notably the CAs, is essential. We outlines the systemic vulnerabilities of HTTPS, maps the thriving market for certificates, and analyzes the suggested regulatory and technological solutions on both sides of the Atlantic. The findings show existing yet surprising market patterns and perverse incentives: not unlike the financial sector, the HTTPS market is full of information asymmetries and negative externalities, as a handful of CAs dominate the market and have become "too big to fail." Unfortunately, proposed E.U. legislation will reinforce systemic vulnerabilities, and the proposed technological solutions that mostly originate in the U.S. are far from being adopted at scale. The systemic vulnerabilities in this crucial technology are likely to persist for years to come.
Technologie en recht
RIS
Bibtex
Cybersecurity dekmantel voor digitale boterberg external link
Twijfels over cyberdiefstal Russische bende external link
Media, users and algorithms: towards a new balance external link
Abstract
In the digital media environment user attention is scarce and competition for ‘eyeballs’ is fierce. Profiling and targeting users with customized news and advertisements is widely seen as a solution, and part of a larger trend to invest in what the New York Times has called ‘smart new strategies for growing our audience’. The shift from public information intermediary to personal information service creates new dynamics but also new imbalances in the relationship between the media and their users. In my inaugural speech I will state that to restore the balance, the media and regulators in Brussels and The Hague need to develop a vision of how to deal with issues such as media user privacy, editorial integrity and more generally ‘fair algorithmic media practices’."
Mediarecht