Behavioral Targeting: A European Legal Perspective external link

IEEE Security & Privacy, num: 1, pp: 82-85, 2013

Abstract

Behavioral targeting, or online profiling, is a hotly debated topic. Much of the collection of personal information on the Internet is related to behavioral targeting, although research suggests that most people don't want to receive behaviorally targeted advertising. The World Wide Web Consortium is discussing a Do Not Track standard, and regulators worldwide are struggling to come up with answers. This article discusses European law and recent policy developments on behavioral targeting.

Grondrechten, Privacy

RIS

Save .RIS

Bibtex

Save .bib

Segmentação Comportamental, Do Not Track e o desenvolvimento jurídico europeu e holandês external link

poliTICs, num: 14, pp: 9-22, 2013

Grondrechten, Privacy

RIS

Save .RIS

Bibtex

Save .bib

Consent to Behavioural Targeting in European Law – What are the Policy Implications of Insights from Behavioural Economics? external link

pp: 1-58, 2013

Grondrechten, Privacy

RIS

Save .RIS

Bibtex

Save .bib

De wind van Snowden in de Amerikaanse informatieparaplu external link

Mediaforum, num: 7/8, pp: 173, 2013

Bescherming van communicatie, Grondrechten

RIS

Save .RIS

Bibtex

Save .bib

Security Economics in the HTTPS Value Chain external link

Asghari, H., Eeten, M.J.G. van, Arnbak, A. & van Eijk, N.
pp: 1-35, 2013

Abstract

Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the security issues from the perspective of the HTTPS value chain. We then discuss the breaches at several Certificate Authorities (CAs). Next, we explore the security incentives of CAs via the empirical analysis of the market for SSL certificates, based on the SSL Observatory dataset. This uncovers a surprising pattern: there is no race to the bottom. Rather, we find a highly concentrated market with very large price differences among suppliers and limited price competition. We explain this pattern and explore what it tells us about the security incentives of CAs, including how market leaders seem to benefit from the status quo. In light of these findings, we look at regulatory and technical proposals to address the systemic vulnerabilities in the HTTPS value chain, in particular the EU eSignatures proposal that seeks to strictly regulate HTTPS communications.

Bescherming van communicatie, Grondrechten

RIS

Save .RIS

Bibtex

Save .bib

PRISM: Obscured by Clouds or the Dark Side of the Moon?: How to Address Governmental Access to Cloud Data from Abroad external link

2013

Grondrechten, Privacy

RIS

Save .RIS

Bibtex

Save .bib

Gespreksnotitie RTG ‘praktijken, gevolgen en wettelijke kaders inzake het aftappen van persoonsgegevens’ external link

Grondrechten, Privacy

RIS

Save .RIS

Bibtex

Save .bib

Obscured by Clouds or How to Address Governmental Access to Cloud Data From Abroad external link

Grondrechten, Privacy

RIS

Save .RIS

Bibtex

Save .bib

Certificate Authority Collapse: Regulating Systemic Vulnerabilities in the HTTPS Value Chain external link

Abstract

Recent breaches and malpractices at several Certificate Authorities (CA’s) have led to a global collapse of trust in these central mediators of Hypertext Transfer Protocol Secure (HTTPS) communications. Given our dependence on secure web browsing, the security of HTTPS has become a top priority in telecommunications policy. In June 2012, the European Commission proposed a new Regulation on eSignatures. As the HTTPS ecosystem is by and large unregulated across the world, the proposal presents a paradigm shift in the governance of HTTPS. This paper examines if, and if so, how the European regulatory framework should legitimately address the systemic vulnerabilities of the HTTPS ecosystem. To this end, the HTTPS authentication model is conceptualised using actor-based value chain analysis and the systemic vulnerabilities of the HTTPs ecosystem are described through the lens of several landmark breaches. The paper explores the rationales for regulatory intervention, discusses the proposed EU eSignatures Regulation and ultimately develops a conceptual framework for HTTPS governance. It apprises the incentive structure of the entire HTTPS authentication value chain, untangles the concept of information security and connects its balancing of public and private interests to underlying values, in particular constitutional rights such as privacy, communications secrecy and freedom of expression. On the short term, specific regulatory measures to be considered throughout the value chain includes proportional liability provisions, meaningful security breach notifications and internal security requirements, but both legitimacy and effectiveness will depend on the exact wording of the regulatory provisions. The EU eSignatures proposal falls short on many of these aspects. In the long term, a robust technical and policy overhaul is needed to address the systemic weaknesses of HTTPS, as each CA is a single point of failure for the security of the entire ecosystem.

Telecommunicatierecht

RIS

Save .RIS

Bibtex

Save .bib

Annotatie bij Rb. ‘s-Gravenhage 11 januari 2012 (Brein / Ziggo & XS4ALL) external link

AMI, num: 3, pp: 119-131, 2012

Grondrechten

RIS

Save .RIS

Bibtex

Save .bib