Let op: om deze website goed te kunnen gebruiken is het noodzakelijk om Cookies aan te zetten. Meer informatie...
  • Welkom bij Burger, kunt u een boek niet vinden? Bel ons 0182-612298.


  • Welkom bij Burger, kunt u een boek niet vinden? Bel ons 0182-612298.

Countering Economic Cyber Espionage and the Right to Privacy

S.A.M. Harleman

Prijs: € 49,-
Voorraad#stock_type# onbekend
(Geen beoordelingen)
Delen:
Productspecificaties
EAN : 9789047300939
Auteur(s) : S.A.M. Harleman
Taal : Nederlands
Onderwerp : Staats- en bestuursrecht
Thema : Constitutionele en bestuurlijke wetgeving: algemeen
Reeks : Montaigne (27)
Uitgever : Boom juridisch
Verschenen : November 2025
Druk : 1
Uitvoering : Paperback
Conditie : Nieuw
Pagina's : 180
Afmetingen : 240 x 170 x 15 mm
Gewicht : 453 gram
Beschrijving

The extent to which intelligence and security services engage in countering state-sponsored economic cyber espionage, and the framework of safeguards applicable to their actions, remains underexplored. The investigatory cyber powers at their disposal often involve the collection and processing of bulk data. While such capabilities are considered essential for identifying national security threats, they also entail significant interference with the right to privacy and data protection. This raises the question of which minimum requirements for privacy and data protection apply when these investigatory powers are used by intelligence and security services against state-sponsored economic cyber espionage. In this research, the author addresses that question by identifying a set of minimum requirements for privacy and data protection in this specific context. The analysis proceeds in five stages: first, examining relevant concepts and developments in the intelligence landscape, particularly regarding the use of investigatory powers against economic cyber espionage; second, identifying minimum requirements for privacy and data protection; third, adapting those requirements to the specific landscape and investigatory powers; and fourth, applying the identified requirements to the framework on the use of investigatory cyber powers by intelligence and security services in the Netherlands. Finally, the author proposes several recommendations.

Velden met een * zijn verplicht