Remove tag content-moderation
article thumbnail

Social Media Platform Fined 100,000 USD by Washington State AG for COPPA Violations

Hunton Privacy

Additionally, the defendants are ordered to continue auditing and moderating their computer-based tagging logic to include words and descriptions of content that may be relevant to or directed to U13 children, and subject any such content to human review.

article thumbnail

Strategic information management in the digital age

CGI

In parallel, the importance of metadata tagging and classification to provide a different facet of information access became more and more apparent. Security tagging of these electronic resources addressed both protection of corporate intellectual property as well as client and customer data. models, prototypes, evidence boxes, etc.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Strategic Information Management in the Digital Age

CGI

In parallel, the importance of metadata tagging and classification to provide a different facet of information access became more and more apparent. Security tagging of these electronic resources addressed both protection of corporate intellectual property as well as client and customer data. 1 INSEAD Professors W. Add new comment.

article thumbnail

Intranets and social computing - first mover disadvantage?

ChiefTech

Lets look at this apparently emerging issue about the “ conflict between the desire to open up will be tempered by risk management and control ”, as by its very nature the KWeb intranet is an open system that runs primarily on user-generated content. static pages of content pushed at users to eagerly consume).

Risk 45
article thumbnail

Moodle flaw exposed users to account takeover

Security Affairs

It allows universities to distribute content to students and teachers. These “message boxes” allow you to type any content you would like to send to the recipient. Always be skeptical when opening pages where there is content other users have permission to edit or add – such as forum posts, direct messages, other people’s profiles.

Passwords 118
article thumbnail

Day two at OSNBC 2008

ChiefTech

Technorati Tags: Online Social Networking and Business Collaboration 2008 , Phillip Bower , Centrelink , Paul Salvati , Smart Service Queensland , Second Life , Dheeraj Chowdhury , NSW Department of Education , Open Source , Scuttle

article thumbnail

This is the old ChiefTech blog.: Business Continuity and Web-based applications: Sync and Distribute

ChiefTech

Synchronisation is of course important for keeping the data accessed current, but I cant help thinking of JP Rangaswami s experience of his blogs Web hosting failure and how his content was recovered again: " The community has been fantastic , coming up with rich and varied suggestions as to how I could salvage the blog.

Paper 40