Blog posts

Blog

Max Verstappen lookalike – Infringement on the race driver’s portrait rights?

Commercials often feature local or international celebrities, who usually have some contractual connection to the company whose products they are promoting. But there are exceptions to the rule. Sometimes, instead of the real person, lookalikes are used to carry the message, as was the case in a commercial by Dutch supermarket chain Picnic featuring a Max Verstappen lookalike. This raises the question whether or not the promotional use of lookalikes is covered by the concept of portrait rights, an issue recently ruled on by the Dutch Supreme Court. In this blog, we will take a closer look at this ruling.

Read More »
Blog

Machine learning and privacy protection – compatible or contradictory?

Machine learning is everywhere, raising privacy-related questions as well. A recently introduced new type of machine learning known as ‘federated learning’ may prove to be a game-changer as it does not involve centralised data storage and processing. Thus, federated learning may mark a significant step forward in the protection of privacy.

Read More »
Blog

Augmented reality – Convenient technology or potential privacy risk?

Augmented reality (AR) has seen spectacular growth over the past few years. The use of AR applications, however, implies the collection of many different types of data, giving rise to various potential issues in terms of privacy assurance and the protection of personal data related to users as well as non-users of the technology. In this blog, we will look at how AR works and what sort of privacy risks may be involved.

Read More »
Blog

Big Brother in the workplace – Is that permissible?

Employers sometimes use cameras in the workplace. Camera surveillance at (or around) the workplace can help prevent theft or property damage. But is placing cameras on the work floor actually allowed? After all, the privacy of employees and/or visitors may be at stake. In this blog we discuss the conditions for camera surveillance at work. This blog also briefly discusses the use of smart cameras and new technologies such as facial recognition.

Read More »
Microtargeting-information-manipulation
Blog

Microtargeting – Thin red line between information and manipulation

In the recent period of municipal elections, Dutch readers of these blogs may have seen ads from various political parties pop up on social media. This is part of a phenomenon commonly known as political microtargeting which, as we speak, is still permitted by applicable law, but if the European Data Protection Supervisor gets his way, will soon be prohibited. In this blog, we will take a closer look at the practice of political microtargeting and its potential socially undesirable effects.

Read More »
Blog

IoT devices – Privacy safe or security hazards?

The Internet of Things (IoT) offers many opportunities. For example, the IoT can make our living environment more efficient and sustainable. IoT devices are developed with new functionalities in mind, but are IoT devices also privacy safe or do these smart devices pose a security risk? In this blog we will discuss the use of IoT devices.

Read More »