Privacy of telecommunications

Results: 5698



#Item
91Case Law Overview 1 DecemberDecember 2015 Working Document  Relevant case-law of CJEU, ECHR and national courts of EU Member States on the right to

Case Law Overview 1 DecemberDecember 2015 Working Document Relevant case-law of CJEU, ECHR and national courts of EU Member States on the right to

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2016-03-15 04:45:05
92Committee Secretary Senate Legal and Constitutional Affairs Committee PO Box 6100 Parliament House Canberra ACT 2600 By email:

Committee Secretary Senate Legal and Constitutional Affairs Committee PO Box 6100 Parliament House Canberra ACT 2600 By email:

Add to Reading List

Source URL: blueprintforfreespeech.net

Language: English - Date: 2015-11-10 07:53:08
93Serious criminal offences, as defined in sect. 100a StPO, in Germany according to police crime statistics

Serious criminal offences, as defined in sect. 100a StPO, in Germany according to police crime statistics

Add to Reading List

Source URL: blueprintforfreespeech.net

Language: English - Date: 2015-11-10 08:11:56
94!  2 Submission!to!the!JCIS!Inquiry!into!Potential! Reforms!of!National!Security!Legislation!

! 2 Submission!to!the!JCIS!Inquiry!into!Potential! Reforms!of!National!Security!Legislation!

Add to Reading List

Source URL: blueprintforfreespeech.net

Language: English - Date: 2015-11-10 08:12:43
95BAS Privacy Policy for AAI Authentification Version 1.0 – Name of the Service Bavarian Archive for Speech Signals Service Provider

BAS Privacy Policy for AAI Authentification Version 1.0 – Name of the Service Bavarian Archive for Speech Signals Service Provider

Add to Reading List

Source URL: www.phonetik.uni-muenchen.de

Language: English - Date: 2015-02-09 09:31:18
96The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2013-10-29 14:55:45
97February 5, 2014 John Verdi, Director of Privacy Initiatives National Telecommunications and Information Administration U.S. Department of Commerce 1401 Constitution Ave N.W., Rm 4725 Washington, D.C

February 5, 2014 John Verdi, Director of Privacy Initiatives National Telecommunications and Information Administration U.S. Department of Commerce 1401 Constitution Ave N.W., Rm 4725 Washington, D.C

Add to Reading List

Source URL: epic.org

Language: English - Date: 2014-02-05 16:45:36
    98Marcia Hofmann (Cal. Bar NoTaylor Street San Francisco, CATelephone: (

    Marcia Hofmann (Cal. Bar NoTaylor Street San Francisco, CATelephone: (

    Add to Reading List

    Source URL: transparency.files.wordpress.com

    Language: English - Date: 2015-07-23 11:00:29
    99Exploiting Locality of Interest in Online Social Networks Mike P. Wittie, Veljko Pejovic, Lara Deek, Kevin C. Almeroth, Ben Y. Zhao Department of Computer Science University of California, Santa Barbara {mwittie, veljko,

    Exploiting Locality of Interest in Online Social Networks Mike P. Wittie, Veljko Pejovic, Lara Deek, Kevin C. Almeroth, Ben Y. Zhao Department of Computer Science University of California, Santa Barbara {mwittie, veljko,

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2010-11-02 09:02:20
    100State of the States Cyber Crime Consortium 2015 Meeting Recap

    State of the States Cyber Crime Consortium 2015 Meeting Recap

    Add to Reading List

    Source URL: www.search.org

    Language: English - Date: 2015-10-20 13:33:15