This document summarizes international laws and policies regarding privacy and mass surveillance in the post-Snowden era. It discusses obligations under international human rights law, calls by the UN General Assembly to review surveillance practices, and reports by the UN High Commissioner for Human Rights criticizing secret interpretations of law and lack of protections for individuals. The document also reviews data privacy regulations in Europe, debates around data localization, encryption technologies, and concludes that strengthening international law and information security is needed to curb mass surveillance by powerful states.
Where next for the Regulation of Investigatory Powers Act?blogzilla
Talk at Open Tech 2015 on legal reform of UK interception and surveillance laws, including a comparison of the Intelligence and Security Committee and David Anderson reports.
Where next for the Regulation of Investigatory Powers Act?blogzilla
Talk at Open Tech 2015 on legal reform of UK interception and surveillance laws, including a comparison of the Intelligence and Security Committee and David Anderson reports.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
A presentation by Pier Luigi Parcu on Artificial Intelligence, elections, media pluralism and media freedom at the European Artificial Intelligence Observatory April 2, 2019
Digital security law security of individual or governmentM S Siddiqui
The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
A presentation by Pier Luigi Parcu on Artificial Intelligence, elections, media pluralism and media freedom at the European Artificial Intelligence Observatory April 2, 2019
Digital security law security of individual or governmentM S Siddiqui
The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation.
The Post Snowden World One Year Later: What Has Changed?Christian Dawson
Increased awareness about government surveillance practices has changed the way society understands privacy, values and due process of the law, leaving individuals and businesses unsure about who has access to their private information. The trust of our customers is the currency upon which the Internet economy is built. It's foundation, the Internet infrastructure industry, must collaborate with others who have a stake in its success to show the world that the United States takes privacy seriously. We are already seeing an international backlash to the activities of the NSA as individual countries and regions seek to implement policies that will fragment the Internet into localized networks. This would discount all the principles that have led to our industry's massive success. Now more than ever, we must work together to ensure that significant reforms are made to maintain the open and free nature of the Internet as we know it.
Seen at InfoSec Europe 2015: Spot your Snowden!John Wallix
If you are IT Operations or CISO, you should heard about Insider Threat and you should have covered already this risk in your organization ... haven't you ? Maybe we can help ... have a look at this presentation.
This presentation is part of the Data Management for the Web course of Politecnico di Milano and is a very small journey into privacy and surveillance in the life after Snowden NSA leak
Snowden as whistleblower - Future of Privacy ForumKathleen Clark
Provides a definition of whistleblowing; examines whether Edward Snowden is a whistleblower; discusses internal and external whistleblowing; draws a parallel between Snowden's audacious act of civil disobedience with the March 8, 1971 break-in of an FBI office in Media, Pennsylvania.
British NewspaperCoverage of State Surveillance and the Edward Snowden Revel...Karin Wahl-Jorgensen
Presentation given at the Future of Journalism, Cardiff University, September 10-11, 2015.
Authors: Karin Wahl-Jorgensen, Lucy Bennett, Jonathan Cable, Arne Hintz, and Lina Dencik
If you're a legal or security professional, the looming General Data Protection Regulation, or GDPR, is likely causing your blood pressure to rise. Expected to impose strict limitations on organizations that do business in the European Union, or otherwise collect the data of European citizens, the regulation is said to raise the stakes for privacy compliance as well as for transcontinental discovery. Organizations that don't meet its standards by May 2018 will be the subject of potentially business-rattling sanctions.
The Patriot Act and Cloud Security - Busting the European FUDResilient Systems
In the wake of Edward Snowden's allegations of NSA cyber spying, we are honored to have a former General Counsel of the NSA as one of our panelists. This is sure to be an especially interesting webinar.
European hosting companies have cited the USA Patriot Act of 2001 as the boogieman that would leave information free for plunder by the dark and clandestine US Government. And NSA activity as described by Edward Snowden has provided a convenient, timely, and high profile case study. But are these concerns well founded? Learn more about the Patriot Act, ways other countries combat terrorism, and how these relate to privacy.
Our featured speakers for this timely webinar will be:
-Stewart Baker, Partner, Steptoe & Johnson LLP; Former Assistant Secretary for Policy at the Department of Homeland Security and General Counsel of the NSA
-Michael Vatis, Partner, Steptoe & Johnson LLP
-Gant Redmon, Esq. CIPP/US General Counsel, Co3 Systems
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...AltheimPrivacy
Check out this link for the latest version: http://www.slideshare.net/EDiscoveryMap/the-eu-data-protection-reforms-impact-on-cross-border-ediscovery-27629797
The European Commission's proposal for a new General Data Protection Regulation (GDPR), represents the most significant global development in data protection law since Directive 95/46. It will considerably impact cross-border e-discovery in the EU.
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...AltheimPrivacy
This is a new set of slides, adapted after the 10/21/2013 LIBE Committee vote on the proposed amendments to the Regulation. Quite a few of the original GDPR rules have changed so far.
What is cyber law?
What is cyber crime?
Cybercrimes areas
what law relating to
Data protection and privacy
Software Licensing Issues
IT acts
Policy Versus Law
Codes of Ethics and Professional Organizations
Should the European Union require the largest social networking services (like Facebook, Instagram and Twitter) to be interoperable with competitors? I explain why and how they should. Originally presented to the European Parliament’s Digital Markets Act working group of MEPs and staff in Brussels, on 24/5/23
Transatlantic data flows following the Schrems II judgmentblogzilla
Brief summary of Ian Brown and Douwe Korff’s study for the European Parliament Civil Liberties Committee, presented at a committee hearing on 9 November 2021
Lessons for interoperability remedies from UK Open Bankingblogzilla
The UK’s Open Banking programme is a world-leading experiment in requiring banks to open up customer accounts (with their explicit consent) to third-party providers. What lessons can be learnt from this case for legislation that would require dominant platforms to provide similar functionality?
Introduction to Cybersecurity for Electionsblogzilla
Slides for a 15-minute introduction to Cybersecurity for Elections: A Commonwealth Guide on Best Practice, by Ian Brown, Chris Marsden, James Lee and Michael Veale, published 5 Mar 2020
A basic cybersecurity introduction for managers, explaining how they and their organisation can guard against common types of attacks, based on the UK National Cyber Security Centre’s Cyber Essentials programme
My presentation at the Tunis Online Freedom Conference, 17 June 2013. Updated for Asia Privacy Scholars Network conference, 9 July 2013, Hong Kong University, and significantly updated for the SCL Policy Forum, 12 Sep 2013, and presentations at Deutsche Bank and Amberhawk (May 2014)
Overview of our GNI report, downloadable from http://globalnetworkinitiative.org/news/new-report-outlines-recommendations-governments-companies-and-others-how-protect-free
Privacy attitudes, incentives and behavioursblogzilla
Presentation at Data Protection Governance symposium, IViR, University of Amsterdam, 20 June 2011, and at Hong Kong University law school seminar on 2 Mar 2012
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
9. International law and politics
• International Covenant on Civil and Political Rights
§17 and §19 and their interpretation by the UN Human
Rights Committee, UN High Commissioner for Human
Rights, and UN Special Rapporteurs (on Freedom of
Opinion and Expression; on the promotion and protection
of human rights and fundamental freedoms while
countering terrorism; on human rights and transnational
corporations)
• Regional treaties, esp. Eur. Conv. on Human Rights §8
and EU Charter of Fundamental Rights §§7-8
• How to make transparent, let alone improve, bi- and multi-lateral
intelligence sharing agreements?
10. United Nations
• General Assembly: “Calls upon all States…To review their
procedures, practices and legislation regarding the
surveillance of communications, their interception and the
collection of personal data, including mass surveillance,
interception and collection, with a view to upholding the
right to privacy by ensuring the full and effective
implementation of all their obligations under international
human rights law” (A/RES/68/167)
• HR Cmtte: Concluding Observations on USA (2014).
Inter-State complaint? (Scheinin)
• IGF 2014: “Civil society managed to get many of these
issues on the conference’s agenda but governments
chose to ignore them.” -Sherif Elsayed-Ali, Deputy
Director of Global Issues at Amnesty International
11. UN High Commissioner for HR
• “Even the mere possibility of communications information being
captured creates an interference with privacy, with a potential
chilling effect on rights” §20
• “overarching principles of legality, necessity and proportionality”
§23
• “secret rules and secret interpretations – even secret judicial
interpretations – of law do not have the necessary qualities of “law”
§29
• “sharing of data between law enforcement agencies,
intelligence bodies and other State organs risks violating article
17” §27
• “Governments have operated a transnational network of
intelligence agencies through interlocking legal loopholes,
involving the coordination of surveillance practice to outflank
the protections provided by domestic legal regimes. Such
practice arguably fails the test of lawfulness” §30
12. UN High Commissioner for HR
• “States have also failed to take effective measures to protect
individuals within their jurisdiction…in breach of their own
human rights obligations.” §30
• “digital surveillance therefore may engage a State’s human
rights obligations if that surveillance involves the State’s
exercise of power or effective control in relation to digital
communications infrastructure, wherever found, for example,
through direct tapping or penetration of that infrastructure.
Equally, where the State exercises regulatory jurisdiction over a
third party that physically controls the data, that State also
would have obligations under the Covenant. If a country seeks
to assert jurisdiction over the data of private companies as a
result of the incorporation of those companies in that country,
then human rights protections must be extended to those
whose privacy is being interfered with, whether in the country
of incorporation or beyond.” §34
13. UN GGE A/68/98 (24 June 2013)
• “international law and in particular the United Nations
Charter, is applicable and is essential to maintaining
peace and stability”
• “States must meet their international obligations regarding
internationally wrongful acts attributable to them”
• “Recommendations on voluntary measures to build trust,
transparency and confidence, as well as international
cooperation to build capacity for ICT security”
• New GGE held first meeting in New York in July 2014,
and elected Brazil as the Chair. Three more meetings in
2015
14. Council of Europe and EU
• CoE Convention 108:
• 7 States Parties do not apply Convention to State security (Andorra, Ireland,
Latvia, Malta, Romania, Russia, Macedonia)
• Modernised Convention does not allow this §3(2)(a) scope limit
• Cybercrime Convention §32
• US-EU umbrella DP agreement
• Accounting and Transparency Directives
• Recent cases:
• ECtHR: Big Brother Watch and ors v UK, App. No. 38170/13; Bernh Larson
Holdings v Norway, App. No. 24117/08; Privacy International v UK
• CJEU: Digital Rights Ireland Ltd v Minister for Communications, Marine and
Natural Resources & Ors C-293/12 and Kärntner Landesregierung, Michael
Seitlinger, Christof Tschohl and others, C 594/12
• 1 BvR 370/07 and 1 BvR 595/07: breaching const. right to IT-security requires
factual evidence indicating a specific threat to an outstanding and overriding
legal interest, such as threats to the life or freedom of an individual, or threats
concerning the fundamentals or existence of the state + judicial authorisation
15. Data localisation
• German interior minister: “whoever fears their
communication is being intercepted in any way should
use services that don't go through American servers.”
• Snowden: “you should never route through or peer with
the UK”
• Brazil & Russia – considered or passed laws requiring
citizens’ data held within country. Digital Rights Ireland
and Art 29 WP on retained communications data
• Regional data centres – but limited impact given
expansive American jurisdiction (In re Warrant to Search a
Certain E-Mail Account Controlled and Maintained by
Microsoft Corp., No. 13-MJ-2814-UA, SDNY 28 Aug. 14)
• Norwegian domains .sj and .bv
16. Renewed focus on encryption
• Storage encryption using client-held keys is relatively
straightforward – e.g. SpiderOak
• Homomorphic encryption in the cloud?
• End-to-end encrypted peer-to-peer systems
• Verifiable?
17. Conclusion
• International law is (slowly) being strengthened – perhaps
not at the scale that will effectively protect privacy against
SIGINT agencies (ideas of optional ICCPR Protocol or
even new General Comment 16 seem to have faded)
• Cybersecurity norms are up for grabs
• IANA and ICANN in some senses a sideshow, aside from
leverage against US, although play important role
concerning WHOIS, and potentially DNSSEC, RPKI, and
more broadly as a fulcrum for transnational enforcement
• Much greater attention to information security a pre-condition
for raising cost of mass surveillance beyond the
great (Internet) powers – IETF role
Intelligence protocol to CoE Convention 108, or interpretations of ICCPR/regional human rights treaties? MLATs? UKUSA amendment?
http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/167
Intelligence protocol to CoE Convention 108, or interpretations of ICCPR/regional human rights treaties? MLATs? UKUSA amendment?
http://www.conventions.coe.int/Treaty/Commun/ListeDeclarations.asp?NT=108&CM=1&DF=07/09/2014&CL=ENG&VL=1
http://tech.transparency-initiative.org/with-milestone-u-k-announcement-eu-disclosure-laws-speeding-toward-reality/
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2013:182:0019:0076:EN:PDF
http://www.twobirds.com/en/news/articles/2008/german-constitutional-court-creates-a-new-fundamental-it-privacy-right
https://www.opendemocracy.net/håkon-wium-lie/net-names-for-safe-shelter Svalbard and Jan Mayen (.sj) and Bouvet Island