article thumbnail

CIPL Publishes New White Paper on the Approach of British Columbia, Canada to Cross-Border Data Transfers by Public Sector Bodies

Hunton Privacy

On June 10, 2022, the Centre for Information Policy Leadership at Hunton Andrews Kurth published a white paper entitled “ Local Law Assessments and Online Services – Refining the Approach to Beneficial and Privacy-Protective Cross-Border Data Flows A: Case Study from British Columbia.”

Paper 101
article thumbnail

CIPL Publishes White Paper on How the Legitimate Interest Ground for Processing Enables Responsible Data Use and Innovation

Hunton Privacy

On July 2, 2021, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth published a white paper on How the Legitimate Interest Ground for Processing for Processing Enables Responsible Data Use and Innovation (the “Paper”).

Paper 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK government’s response to AI White Paper consultation: next steps for implementing the principles

Data Protection Report

The authors acknowledge the assistance of Salma Khatab, paralegal, in researching and preparing some aspects of this blog The UK Department for Science, Innovation, and Technology (DSIT) has published its response to its consultation on its white paper, ‘A pro innovation approach to AI regulation ’ (the Response). Contestability and redress.

Paper 63
article thumbnail

AI and AI policy top the agenda at CILIP Supplier Forum

CILIP

This article is featured on the AI hub AI policy is set to become the new GDPR, and the release of the UK government’s AI Regulation White Paper this month is accelerating government action on building a legal framework for AI regulation.

article thumbnail

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

article thumbnail

[Podcast] Transforming How Mortgage Insurance Applications Are Processed

AIIM

This industry is full of time-consuming, error-prone, and paper and labor-intensive processes, all perfectly-suited for automation. Automation can help banks lower loan processing costs, shorten cycle times, unlock visibility, and lower compliance risk. But, what does this digital transformation look like?

Insurance 117
article thumbnail

The Limits of Cyber Operations in Wartime

Schneier on Security

Interesting paper by Lennart Maschmeyer: “ The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations “: Abstract: Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. A case study of the Russo-Ukrainian conflict provides empirical support for the argument.

Paper 109