VULNERABILITIES EQUITIES PROCESS

= Articles =

= Resources =


 * https://epic.org/privacy/cybersecurity/vep/
 * https://www.eff.org/files/2015/09/04/document_71_-_vep_ocr.pdf