De zorgsector verwerkt zeer gevoelige persoonsgegevens, waaronder gezondheidsgegevens. Bij onvoorzichtige omgang, kan dit een grote impact hebben op de rechten en vrijheden van natuurlijke personen. eHealth moet daarom voldoen aan het vereiste van data protection by design. Wanneer hieraan niet is voldaan, is het zaak om handhavend op te treden ter voorkoming van datalekken. Sinds de Algemene Verordening Gegevensbescherming (AVG) van toepassing is, bereikten meerdere datalekken het voorpaginanieuws waarbij eHealth niet voldeed aan voornoemde verplichting. In dit artikel onderzoeken de auteurs in hoeverre de in de AVG opgenomen handhavingsmogelijkheden met bijbehorende rechtsmiddelen de bescherming van persoonsgegevens waarborgen bij de inzet van eHealth.
DOCUMENT
In this project we take a look at the laws and regulations surrounding data collection using sensors in assistive technology and the literature on concerns of people about this technology. We also look into the Smart Teddy device and how it operates. An analysis required by the General Data Protection Regulation (GDPR) [5] will reveal the risks in terms of privacy and security in this project and how to mitigate them. https://nl.linkedin.com/in/haniers
MULTIFILE
Human rights groups are increasingly calling for the protection of their right to privacy in relation to the bulk surveillance and interception of their personal communications. Some are advocating through strategic litigation. This advocacy tool is often chosen when there is weak political or public support for an issue. Nonetheless, as a strategy it remains a question if a lawsuit is strategic in the context of establishing accountability for indiscriminate bulk data interception. The chapter concludes that from a legal perspective the effect of the decision to litigate on the basis of the claim that a collective right to group privacy was violated has not (yet) resulted in significant change. Yet the case study, the British case of human rights groups versus the intelligence agencies, does seem to suggest that they have been able to create more public awareness about mass surveillance and interception programs and its side-effects
LINK
Op grond van de AVG is de verwerkingsverantwoordelijke verplicht om een datalekregister bij te houden. Daarnaast wordt aangeraden om een datalekprotocol te hebben of enige vorm van een stappenplan rondom de signalering, melding, vastlegging en analyse van een datalek binnen de organisatie. Ook mkb-bedrijven uit Noord-Nederland moeten, wanneer zij persoonsgegevens verwerken, voldoen aan de AVG. In de praktijk blijkt dat men wel wil voldoen, vaak ook wel deels voldoet, maar niet precies weet hoe je dit het handigst kunt doen, omdat privacy geen onderdeel is van hun core business en ze vaak ook geen FG of andere privacy-medewerker in dienst hebben. Een datalek is echter wel een risico voor de organisatie: er kan een lek zijn in de cybersecurity van een bedrijf, er is een risico op aansprakelijkheidstelling wegens schade, danwel de kans op een boete van de AP. Ter vergroting van de digitale weerbaarheid van de mkb-ondernemingen in Noord-Nederland hebben derdejaars-studenten van HBO-rechten een mkb-datalekkenprotocol ontwikkeld. Disclaimer:Deze opdracht is uitgevoerd door studenten in het kader van hun opleiding bij het Instituut voor Rechtenstudies. De studenten leveren een juridisch beroepsproduct op en doen daartoe onderzoek. De studenten wordt tijdens de uitvoering van de opdracht begeleid door een coach. De inspanningen van de studenten en de coach zijn erop gericht om een zo goed mogelijk beroepsproduct op te leveren. Dit moet opgevat worden als een product van (derdejaars)studenten en niet van een juridische professional. Mocht ondanks de geleverde inspanningen de informatie of de inhoud van het beroepsproduct onvolledig en/of onjuist zijn, dan kunnen de Hanzehogeschool Groningen, het Instituut voor Rechtenstudies, individuele medewerkers en de studenten daarvoor geen aansprakelijkheid aanvaarden.
DOCUMENT
Voetbal en witwassen zijn begrippen die steeds vaker met elkaar worden geassocieerd. Een blik op de krantenkoppen uit het voorjaar van 2019 suggereert dat de sport een criminaliteitsprobleem heeft.
MULTIFILE
Dit Trendrapport Open Education 2014 beschrijft de trends op het gebied van open education in binnen- en buitenland, geschreven vanuit de context van het Nederlandse hoger onderwijs. Dat gebeurt aan de hand van acht artikelen van Nederlandse experts op het gebied van open en online onderwijs en acht korte intermezzo’s.
DOCUMENT
In the literature about web survey methodology, significant eorts have been made to understand the role of time-invariant factors (e.g. gender, education and marital status) in (non-)response mechanisms. Time-invariant factors alone, however, cannot account for most variations in (non-)responses, especially fluctuations of response rates over time. This observation inspires us to investigate the counterpart of time-invariant factors, namely time-varying factors and the potential role they play in web survey (non-)response. Specifically, we study the effects of time, weather and societal trends (derived from Google Trends data) on the daily (non-)response patterns of the 2016 and 2017 Dutch Health Surveys. Using discrete-time survival analysis, we find, among others, that weekends, holidays, pleasant weather, disease outbreaks and terrorism salience are associated with fewer responses. Furthermore, we show that using these variables alone achieves satisfactory prediction accuracy of both daily and cumulative response rates when the trained model is applied to future unseen data. This approach has the further benefit of requiring only non-personal contextual information and thus involving no privacy issues. We discuss the implications of the study for survey research and data collection.
DOCUMENT
Spectral imaging has many applications, from methane detection using satellites to disease detection on crops. However, spectral cameras remain a costly solution ranging from 10 thousand to 100 thousand euros for the hardware alone. Here, we present a low-cost multispectral camera (LC-MSC) with 64 LEDs in eight different colors and a monochrome camera with a hardware cost of 340 euros. Our prototype reproduces spectra accurately when compared to a reference spectrometer to within the spectral width of the LEDs used and the ±1σ variation over the surface of ceramic reference tiles. The mean absolute difference in reflectance is an overestimate of 0.03 for the LC-MSC as compared to a spectrometer, due to the spectral shape of the tiles. In environmental light levels of 0.5 W m−2 (bright artificial indoor lighting) our approach shows an increase in noise, but still faithfully reproduces discrete reflectance spectra over 400 nm–1000 nm. Our approach is limited in its application by LED bandwidth and availability of specific LED wavelengths. However, unlike with conventional spectral cameras, the pixel pitch of the camera itself is not limited, providing higher image resolution than typical high-end multi- and hyperspectral cameras. For sample conditions where LED illumination bands provide suitable spectral information, our LC-MSC is an interesting low-cost alternative approach to spectral imaging.
MULTIFILE
Worldwide there is a lack of well-educated and experienced information security specialists. The first step to address this issue is arranging enough people with a well-known and acceptable basic level of information security competences. However, there might be a lot of information security education and training, but there is anything but a well-defined outflow level with a known and acceptable basic level of information security competences. There exists a chaotic situation in respect of the qualification of information security professionals, with the emergence of a large number of difficult to compare certificates and job titles. Apparently the information security field requires uniform qualifications that are internationally recognized. Such qualifications could be an excellent way of unambiguously clarifying the knowledge and skills of information security professionals. Furthermore it gives educational institutions a framework which facilitates the development of appropriate information security education and training.
DOCUMENT
Digital surveillance technologies using artificial intelligence (AI) tools such as computer vision and facial recognition are becoming cheaper and easier to integrate into governance practices worldwide. Morocco serves as an example of how such technologies are becoming key tools of governance in authoritarian contexts. Based on qualitative fieldwork including semi-structured interviews, observation, and extensive desk reviews, this chapter focusses on the role played by AI-enhanced technology in urban surveillance and the control of migration between the Moroccan–Spanish borders. Two cross-cutting issues emerge: first, while international donors provide funding for urban and border surveillance projects, their role in enforcing transparency mechanisms in their implementation remains limited; second, Morocco’s existing legal framework hinders any kind of public oversight. Video surveillance is treated as the sole prerogative of the security apparatus, and so far public actors have avoided to engage directly with the topic. The lack of institutional oversight and public debate on the matter raise serious concerns on the extent to which the deployment of such technologies affects citizens’ rights. AI-enhanced surveillance is thus an intrinsically transnational challenge in which private interests of economic gain and public interests of national security collide with citizens’ human rights across the Global North/Global South divide.
MULTIFILE