Remove tag biometric-data
article thumbnail

Data privacy examples

IBM Big Data Hub

An online retailer always gets users’ explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. One cannot overstate the importance of data privacy for businesses today. The app heavily encrypts all user financial data.

article thumbnail

Illinois Court Says Biometric Fingerprint is Violation of Privacy, Even Without Injury: Data Privacy Trends

eDiscovery Daily

On January 25, the Illinois Supreme Court rejected an argument from a popular theme park that would have limited a state law that requires consent for the use of facial recognition and other biometrics. US , I’ve been saying that 2018 was the year of data privacy. It doesn’t seem to be slowing down any in 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

Facial recognition software (FRS) is a biometric tool that uses artificial intelligence (AI) and machine learning (ML) to scan human facial features to produce a code. With all the gathered data on facial recognition technology, it indeed offers significant potential for the security aspects of enterprises.

article thumbnail

GDPR personal data explained

Collibra

The General Data Protection Regulation (GDPR), in force since May 25, 2018, requires businesses to protect the personal data and privacy of European Union (EU) citizens, for transactions that occur within EU Member States. The GDPR also regulates the exportation of personal data outside the EU. Location data .

article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Once connected, data can be exchanged, and the body and device can be remotely monitored and controlled.” On the downside, because of their almost constant presence, the devices can facilitate an all-encompassing capture of personal information, intended and unintended, which, for example, can run afoul of workplace privacy laws.