article thumbnail

Data monetization: driving the new competitive edge in retail

CGI

Data monetization: driving the new competitive edge in retail. Retailers are fully aware that their future relies largely on their ability to use data efficiently. However, in today’s dynamic and highly competitive retail sector, retailers need to accelerate their plans and commit resolutely to the path of data monetization.

Retail 96
article thumbnail

UK Tribunal Rules on Direct Marketing ICO Case Against Experian

Hunton Privacy

On February 20, 2023, in the case of Experian Limited v The Information Commissioner , the First-Tier Tribunal in the UK (the “ Tribunal ”) ruled on the ICO’s action to require Experian to make changes to how it processes personal data for direct marketing purposes. Experian appealed the enforcement notice, which was heard by the Tribunal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Adding to this will be very smart uses of generative AI – centered around wisely directing LLM capacities onto specific data lakes containing threat intelligence information.

article thumbnail

CNIL Releases Guidance on Teleworking

Hunton Privacy

On April 1, 2020, the French Data Protection Authority (the “CNIL”) released guidance for employers on how to implement teleworking (the “Guidance”) as well as best practices for their employees in this context (the “Best Practices”). Transmitting personal data in a secure way. Guidance for Employers.

article thumbnail

The Race to Hide Your Voice

WIRED Threat Level

Voice recognition—and data collection—have boomed in recent years. Researchers are figuring out how to protect your privacy.

article thumbnail

When Consumerisation and Cloud Services = Shadow IT

CGI

There are more cloud services available than ever before, and the number of cloud services used in the workplace continues to increase at a phenomenal rate, spanning both sanctioned cloud services (aka sanctioned IT) and shadow cloud services (aka shadow IT). sensitive data often being shared through public links etc.

Cloud 40
article thumbnail

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT).

CGI

Prior to the use of the IoT label solutions involving connected things or devices were referred to as Machine to Machine (M2M), SCADA (Supervisory Control and Data Acquisition) or Telemetry. The term M2M has been used as a generic term for all such systems, SCADA solutions were typically deployed for transport or Utilities (e.g.

IoT 40