-
1
-
-
84988606676
-
-
OJ L 122/47 of 16 May
-
European Commission: Recommendation of 12 May 2009 on the implementation of privacy and data protection principles in applications supported by radiofrequency identification. OJ L 122/47 of 16 May 2009. http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32009H0387&from=EN
-
(2009)
-
-
-
2
-
-
84988675465
-
-
OJ L 73/9 of 13 March
-
European Commission: Recommendation of 9 March 2012 on preparations for the roll-out of smart metering systems. OJ L 73/9 of 13 March 2012. http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32012H0148&from=EN
-
(2012)
-
-
-
3
-
-
84988608624
-
-
WP 175
-
Article 29 Working Party: Opinion 5/2010 on the Industry Proposal for a Privacy and Data Protection Impact Assessment Framework for RFID Applications. WP 175 (2010). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2010/wp175en.pdf
-
(2010)
-
-
-
4
-
-
84988548543
-
-
WP 209
-
Article 29 Working Party: Opinion 07/2013 on the Data Protection Impact Assessment Template for Smart Grid and Smart Metering Systems (‘DPIA Template’) prepared by Expert Group 2 of the Commission’s Smart Grid Task Force. WP 209 (2013). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp209en.pdf
-
(2013)
-
-
-
6
-
-
84988675461
-
-
ISO/IEC, International Organization for Standardization
-
ISO/IEC 29134: Information technology-Security techniques-Privacy impact assessment-Guidelines. ISO/IEC, International Organization for Standardization (2016)
-
(2016)
-
-
-
7
-
-
84988608636
-
-
ICO
-
ICO (Information Commissioner’s Office): Conducting privacy impact assessments code of practice. ICO (2014). https://ico.org.uk/media/for-organisations/documents/1595/pia-code-of-practice.pdf
-
(2014)
-
-
-
8
-
-
84988605734
-
-
Privacy Impact Assessment: Methodology (how to carry out a PIA). CNIL
-
CNIL (Commission Nationale de l’Informatique et des Libertés): Privacy Impact Assessment: Methodology (how to carry out a PIA). CNIL (2015). http://www.cnil.fr/fileadmin/documents/en/CNIL-PIA-1-Methodology.pdf
-
(2015)
-
-
-
9
-
-
84988626330
-
-
Forum Privatheit und selbstbestimmtes Leben in der digitalen Welt, Karlsruhe
-
Friedewald, M., Bieker, F., Nebel, M., Obersteller, H., Rost, M.: Datenschutz-Folgenabschätzung-Ein Werkzeug für einen besseren Datenschutz. Forum Privatheit und selbstbestimmtes Leben in der digitalen Welt, Karlsruhe (2016). https://www.forum-privatheit.de
-
(2016)
Datenschutz-Folgenabschätzung-Ein Werkzeug für Einen Besseren Datenschutz
-
-
Friedewald, M.1
Bieker, F.2
Nebel, M.3
Obersteller, H.4
Rost, M.5
-
10
-
-
84988681452
-
Privacy Impact Assessment and Smart Surveillance: A State of the Art Report
-
Wright, D., Gellert, R., Bellanova, R., Gutwirth, S., Langheinrich, M., Friedewald, M., Hallinan, D., Venier, S., Mordini, E.: Privacy Impact Assessment and Smart Surveillance: A State of the Art Report, Deliverable 3.1 SAPIENT Project (2013). http://www.sapient-project.eu
-
(2013)
Deliverable 3.1 SAPIENT Project
-
-
Wright, D.1
Gellert, R.2
Bellanova, R.3
Gutwirth, S.4
Langheinrich, M.5
Friedewald, M.6
Hallinan, D.7
Venier, S.8
Mordini, E.9
-
11
-
-
84876962761
-
Evaluating privacy impact assessments
-
Wadhwa, K., Rodrigues, R.: Evaluating privacy impact assessments. Innov. Eur. J. Soc. Sci. Res. 26(1-2), 161-180 (2013)
-
(2013)
Innov. Eur. J. Soc. Sci. Res
, vol.26
, Issue.1-2
, pp. 161-180
-
-
Wadhwa, K.1
Rodrigues, R.2
-
12
-
-
84963942559
-
Developing and testing a surveillance impact assessment methodology
-
Wright, D., Friedewald, M., Gellert, R.: Developing and testing a surveillance impact assessment methodology. Int. Data Priv. Law 5(1), 40-53 (2015)
-
(2015)
Int. Data Priv. Law
, vol.5
, Issue.1
, pp. 40-53
-
-
Wright, D.1
Friedewald, M.2
Gellert, R.3
-
13
-
-
84988675497
-
-
Schulz, G., Rost, M.: Das Standard-Datenschutzmodell-der Weg vom Recht zur Technik: Ein Datenschutzwerkzeug für Aufsichtsbehörden und verantwortliche Stellen
-
AK Technik der Konferenz der Datenschutzbeauftragten des Bundes und der Länder, Schulz, G., Rost, M.: Das Standard-Datenschutzmodell-der Weg vom Recht zur Technik: Ein Datenschutzwerkzeug für Aufsichtsbehörden und verantwortliche Stellen (2015). https://www.datenschutzzentrum.de/uploads/sdm/SDMTagungsband2015Hannover.pdf
-
(2015)
-
-
-
14
-
-
84945946726
-
Protection goals for privacy engineering
-
IEEE
-
Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: 2015 International Workshop on Privacy Engineering (IWPE), Security and Privacy Workshops (SPW), pp. 159-166. IEEE (2015)
-
(2015)
2015 International Workshop on Privacy Engineering (IWPE), Security and Privacy Workshops (SPW)
, pp. 159-166
-
-
Hansen, M.1
Jensen, M.2
Rost, M.3
-
16
-
-
84945944391
-
Privacy by Design and the New Protection Goals
-
Rost, M., Bock, K.: Privacy by Design and the New Protection Goals, EuroPriSe Whitepaper (2011). https://www.european-privacy-seal.eu/AppFile/GetFile/ca6cdc46-d4dd-477d-9172-48ed5f54a99c
-
(2011)
Europrise Whitepaper
-
-
Rost, M.1
Bock, K.2
-
17
-
-
84865521711
-
Top 10 mistakes in system design from a privacy perspective and privacy protection goals
-
Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.), Springer, Heidelberg
-
Hansen, M.: Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol. 375, pp. 14-31. Springer, Heidelberg (2012)
-
(2012)
Privacy and Identity 2011. IFIP AICT
, vol.375
, pp. 14-31
-
-
Hansen, M.1
-
18
-
-
84945908211
-
Privacy and Data Protection by Design-from policy to engineering
-
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le Métayer, D., Tirtea, R., Schiffner, S.: Privacy and Data Protection by Design-from policy to engineering, ENISA (2014). https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-by-design/atdownload/fullReport
-
(2014)
ENISA
-
-
Danezis, G.1
Domingo-Ferrer, J.2
Hansen, M.3
Hoepman, J.H.4
Le Métayer, D.5
Tirtea, R.6
Schiffner, S.7
-
19
-
-
84988681456
-
-
BSI-Standard 100-2, IT-Grundschutz Methodology
-
Bundesamt für Sicherheit in der Informationstechnik (Federal Office for Information Security): BSI-Standard 100-2, IT-Grundschutz Methodology (2008). https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/BSIStandards/standard 100-2epdf.pdf
-
(2008)
-
-
-
20
-
-
84922583149
-
Generische Schutzmaßnahmen für Datenschutz-Schutzziele
-
Probst, T.: Generische Schutzmaßnahmen für Datenschutz-Schutzziele. DuD-Datenschutz und Datensicherheit 36, 439-444 (2012)
-
(2012)
Dud-Datenschutz Und Datensicherheit
, vol.36
, pp. 439-444
-
-
Probst, T.1
|