Designing Contact-Tracing Apps
Schneier on Security
SEPTEMBER 13, 2021
Susan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps. Also see her excellent book on the topic.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Schneier on Security
SEPTEMBER 13, 2021
Susan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps. Also see her excellent book on the topic.
CILIP
APRIL 15, 2024
However, we’re experiencing a proliferation of mobile educational apps and learning tools at a time when parents are calling for a “smartphone-free childhood”. AI and machine learning, virtual reality, open educational textbooks and open access resources, enhanced personalisation and student engagement using mobile apps, for example.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
DECEMBER 15, 2023
It was connected to your smartphone. ChatGPT both surprised and amazed the world with its ability to understand human language and generate credible, on-topic, humanlike responses. In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It had sensors like cameras and thermostats.
eDiscovery Daily
AUGUST 5, 2019
In our webcast last week ( Key eDiscovery Case Law Review for the First Half of 2019 ), Tom O’Connor and I discussed several cases (including this one , this one and this one , involving the late musician Prince) where spoliation and sanctions associated with smartphone ESI were the key issue being addressed. And, here’s a spoiler alert!
eDiscovery Daily
FEBRUARY 18, 2020
But still a relatively easy and to create archives and now given the arrival of Google One, a variety of methods exist for handling Android smartphone data. Again, while Apple iOS holds a large share of the smartphone operating systems’ market within the United States, Google Android remains the market leader with a 51.8%
eDiscovery Daily
FEBRUARY 12, 2020
And no small reason for that is that most of the discussion on the topic has come from Craig Ball, who is, like many attorneys, an Apple guy. Although Apple iOS holds a large share of the smartphone operating systems’ market within the United States, Google Android remains the market leader with a 51.8% share as of September 2019.
eSecurity Planet
MARCH 15, 2024
It provides extensive insights into cybersecurity topics to guide users through offensive strategies like Wi-Fi network attacks using specialized tools. Mobile hacking: This feature allows users to investigate vulnerabilities particular to mobile devices, such as smartphones and tablets.
Thales Cloud Protection & Licensing
JULY 12, 2023
The following statistics highlight the need to reach out to kids: 73% of teenagers can’t imagine life without a smartphone, and half take their phones to bed. This is when children start participating in cyber and digital activities and develop disciplinary preferences and career aspirations.
Data Protection Report
FEBRUARY 16, 2023
smartphones, laptops, or tablets) for both personal and business purposes. Training materials and programs should be developed and delivered regularly, to educate employees on topics such as encryption, malware, data retention, and authentication.
DLA Piper Privacy Matters
MARCH 20, 2023
As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). The CNIL will continue its investigations in 2023.
eDiscovery Daily
MARCH 20, 2019
Smartphones aside, while I have seen several criminal cases involving IoT devices (including this one , this one and this one ), I haven’t too many civil cases involving IoT devices (yet). Further, it addresses topics including data privacy, fog computing, smart cities and more. So, what do you think?
AIIM
MARCH 19, 2020
They tend to be more modular, to account for busy lifestyles and are often accessible from most tablets and smartphones. Participants can share their lessons learned and horror stories and ask questions of each other and the instructor in order to clarify or expand upon a topic.
Schneier on Security
JANUARY 8, 2019
This is why your computer and smartphone software is constantly being patched; software vendors are fixing bugs that are also vulnerabilities that have been discovered and are being used. There are challenges with that, of course, but there is already a healthy amount of academic literature on the topic -- and research is continuing.
Security Affairs
JUNE 8, 2021
Criminals were using secure smartphones configured to run only the An0m app that was able to communicate only with peers with the same configuration. Below my interview on the topic made with TRT World: Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini. SecurityAffairs – hacking, Trojan Shield).
Synergis Software
OCTOBER 23, 2018
I’m telling you this as a setup to the topic of this blog post, the future of augmented reality. Side note: If it seems like I’m going off topic for a Synergis Software blog post, allow me to explain. Each panelist then had the opportunity to extend their remarks based on the insights of their peers.
John Battelle's Searchblog
SEPTEMBER 11, 2011
I wrote on the impact of location - you know I've been on about this topic for nearly two years now. Thanks to those smartphones in their pockets, your customers are telling you what they want – explicitly and implicitly – and what they expect from you as a brand. Here's my piece. Fail to listen (and respond) at your own peril.
Security Affairs
APRIL 8, 2022
Endpoints are the devices that connect to your networks, such as laptops, smartphones, and printers. Cloud security is an important and complex topic, and there are considerations beyond the scope of this article. This way, you only have to remember one master password to access all of your other passwords. Secure your endpoints.
eDiscovery Daily
APRIL 9, 2019
Smartphones remain the primary source for digital evidence with 91% of respondents indicating that evidence sources from smartphones were an evidence source “very frequently” (81%) or “frequently” (10%). Please share any comments you might have or if you’d like to know more about a particular topic.
Information Governance Perspectives
JANUARY 29, 2024
Library science is an interdisciplinary field incorporating the humanities, law, and applied science that studies topics related to libraries, the collection, organization, preservation, and dissemination of information resources, and the political economy of information. What’s it like to work in this field?
Schneier on Security
SEPTEMBER 26, 2019
This is a complicated topic. You have little choice but to rely on the companies that build your computers and write your software, whether in your smartphones, your 5G wireless infrastructure, or your subway cars. There is definitely a national security risk in buying computer infrastructure from a country you don't trust.
eDiscovery Daily
JANUARY 11, 2022
Now you have the context to perform the smartphone forensics and short message discovery you need to follow a conversation that began in Slack but transitioned to text messaging before concluding in WhatsApp. This results in a lot of time and money wasted redacting large parts of the text thread, irrelevant to the topic. .
eDiscovery Daily
MARCH 12, 2018
Topics include: Overview of Rules for Criminal Matters. I love it when Tom provides the topic and makes my life easier! I’m on a panel discussion at 9am ET in a session titled Getting Critical Information From The Tough Locations – Cloud, IOT, Social Media, And Smartphones! How Data is Acquired in Criminal Matters.
Everteam
APRIL 4, 2019
If you haven’t read about this topic, let us highlight the advanced cryptography of Quantum Computing. Cyber Security: Everteam provides proper ECM solutions to meet compliance and security requirements, and what we are expecting from Quantum Computing is an even higher Cyber security. Again, the power of Analysis. Traffic control.
eDiscovery Daily
MARCH 28, 2018
The focus of this year’s conference is effectively managing the everyday case and they will have interesting sessions throughout the day, covering topics ranging from eDiscovery security and data protection to early assessment of the case and the data to keywords, TAR and AI (do I need to spell out those acronyms anymore?). Check it out!
Security Affairs
JANUARY 14, 2021
The ads usually offer cameras, game consoles, laptops, smartphones, and similar items for sale at deliberately low prices. The hierarchy of the scammer groups represents a pyramid, with the topic starters on top. The topic starters’ share is about 20-30 percent of the stolen sum.
Security Affairs
OCTOBER 13, 2020
The cybersecurity issues related to IoT are a brand-new topic in the niche. It’s up to the end-users to update their IoT devices, and that is a potential problem because people are still reluctant to update their smartphones and computers. Once they found backdoors, they released updates and patches to deliver necessary security fixes.
ChiefTech
MAY 22, 2012
Less than a quarter of the Australian Government's regular websites can be considered smartphone or mobile-friendly, according to a survey conducted by iTnews. Sticking with transport, in some states it is now possible to renew your car registration electronically using a smartphone. via itnews.com.au. compliant.
eDiscovery Daily
MARCH 20, 2018
Brett speaks around the country on litigation support, eDiscovery, Mac, and iOS-related topics and today authors a variety of blogs and online courses for legal professionals. What are the “hot” topics and issues that you find your clients are most consistently encountering? As an eDiscovery consultant, you work with a lot of clients.
eDiscovery Daily
FEBRUARY 22, 2018
The focus of this year’s UF Law E-Discovery conference is effectively managing the everyday case and they will have interesting sessions throughout the day, covering topics ranging from eDiscovery security and data protection to early assessment of the case and the data to keywords, TAR and AI (do I need to spell out those acronyms anymore?).
eDiscovery Daily
FEBRUARY 21, 2019
Sent from my Samsung Galaxy smartphone. Anybody who sends emails from their smartphones knows that we sometimes abbreviate, misspell, uncapitalize and so forth – phone email messages often have their own “email shorthand”, so the informality of this message seems consistent with that. i need you to get something done for me.
Data Matters
MAY 23, 2018
A 2015 FCC Ruling had defined this term broadly, appearing to sweep in everyday smartphones. Circuit opinion plus a few more TCPA topics. The part of the decision attracting the most attention addresses what sorts of devices qualify as an “automatic telephone dialing system” (“autodialer”) under the statute.
CGI
JANUARY 24, 2019
While I touched on the user experience as a key area of focus, I didn’t get a chance to drill down into the topic of human-centered design, or to share a favorite anecdote about peanut butter and jelly sandwiches and computer engineering. In my previous blog post , I explored ways successful organizations approach digital transformation.
eDiscovery Daily
MARCH 26, 2018
I’m on a panel discussion at 9am ET in a session titled Getting Critical Information From The Tough Locations – Cloud, IOT, Social Media, And Smartphones! And, as always, please share any comments you might have or if you’d like to know more about a particular topic. with Craig Ball, Kelly Twigger, with Judge Amanda Arnold Sansone.
eDiscovery Daily
APRIL 4, 2018
Greg Nojeim, senior counsel and director of the Freedom, Security and Technology Project at the Center for Democracy & Technology, said it’s possible in many cases there would be a valid concern about law enforcement using fingerprints on smartphones without any probable cause.
eDiscovery Daily
AUGUST 6, 2019
I already noted that in our webcast last week ( Key eDiscovery Case Law Review for the First Half of 2019 ), Tom O’Connor and I discussed several cases (including this one , this one and this one ) where spoliation and sanctions associated with smartphone ESI were the key issue being addressed. Chalk up another one. So, what do you think?
Data Breach Today
DECEMBER 27, 2017
Creating long emails containing multiple topics is a great way of segregating your prospects. CXOs, on the other hand, rely on techs that are easy to carry and use thus making smart smartphones other handy devices their priority. It does promote the host, but that is a win-win situation for you always. Are you into Drip Marketing?
Collibra
MAY 29, 2020
Over the past several weeks we’ve been covering a lot about data privacy, and particularly why it’s such a hot topic in the current climate. Have you seen that recent article in the Wall Street Journal about how smartphones use facial recognition? Many organizations have recognized that data is one of their greatest assets.
Hunton Privacy
OCTOBER 11, 2010
The Guidance is divided into 17 chapters, each dealing with a specific topic about data security, including: Identifying data security risks. smartphones, laptops, PDAs, flash drives). Authentication of users. Educating users on data security risks. Security of work stations. Security of external devices (e.g.
eDiscovery Daily
MARCH 22, 2018
With regards to the industry in general, what do you think are some of the hot topics people are talking about? And, what do you think are some of the hot topics that people should be talking about? I’d try to make the topics narrow enough so that people could get into depth on things and try to offer a wide range.
eDiscovery Daily
JANUARY 29, 2019
In addition to that, yesterday and today, CloudNine is launching its new NineForum Discovery Education Series where prominent and highly respected eDiscovery and litigation support experts will deliver 9 TED-style talks, 20 minutes each, covering important topics impacting the legal community. What’s in Your Smartphone?
eDiscovery Daily
FEBRUARY 11, 2018
I’m on a panel discussion in a session titled Getting Critical Information From The Tough Locations – Cloud, IOT, Social Media, And Smartphones! Please share any comments you might have or if you’d like to know more about a particular topic. Click here to register! So, what do you think? Does your organization have a BYOD policy?
The Last Watchdog
JUNE 6, 2022
It was only a few short years ago that BYOD and Shadow IT exposures were the hot topics at RSA. Employees using their personally-owned smartphones to upload cool new apps presented a nightmare for security teams. For a full drill down on our discussion, please give the accompanying podcast a listen. Here are key takeaways.
eDiscovery Daily
JULY 1, 2018
In this Legaltech News article ( Apple and Samsung Call a Truce in Long-Running Smartphone War , written by Scott Graham), the author notes that lawyers for Apple Inc. Please let us know if any comments you might have or if you’d like to know more about a particular topic. Now, finally – quietly – it’s all over. informed U.S.
eDiscovery Daily
AUGUST 14, 2018
As a result of the conflicting testimony, the defendants requested the smartphones which the plaintiff claimed were used to take the photos. Please let us know if any comments you might have or if you’d like to know more about a particular topic. Was dismissal too harsh a sanction here? Happy Anniversary to my beautiful wife Paige!
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content