Sat.Sep 07, 2013 - Fri.Sep 13, 2013

article thumbnail

The Best Platform for Incubation Is the Web

John Battelle's Searchblog

'The post The Best Platform for Incubation Is the Web appeared first on John Battelle's Search Blog. ( image ) Yesterday in the course of my seemingly endless attempt to stay current in this industry, I came across this article on VentureBeat: Searching for the next Zuckerberg: A day in the life of a Lightspeed Fellow. It chronicles the experiences of the chosen few who have made it into a VC-backed incubator, focusing on two Stanford students who are trying to create a new sensor for lap

Sales 108
article thumbnail

Federal Court: Non-Public Facebook Wall Posts Are Protected Under the Federal Stored Communications Act

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : The U.S. District Court for the District of New Jersey recently ruled that non-public Facebook wall posts are protected under the Federal Stored Communications Act (the “SCA”) in Ehling v. Monmouth-Ocean Hospital Service Corp. , No. 2:11-CV-3305 (WMJ) (D.N.J. Aug. 20, 2013). The plaintiff was a registered nurse and paramedic at Monmouth-Ocean Hospital Service Corp.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Talking about user adoption at the NSW KM Forum on 24th September, 2013

ChiefTech

'This month, I''ve been invited to talk about user adoption at the NSW KM Forum : Why is user adoption of new workplace information technologies - such as SharePoint - so difficult, yet people appear to have no difficulty learning how to use Facebook or Candy Crush? I''ll be talking about: What is user adoption? And should we even be talking about "users" and "adoption"?

article thumbnail

New enforcement policy published by ICO demonstrating lack of resource?

Privacy and Cybersecurity Law

Focussed enforcement action The UK Information Commissioner’s Office (ICO) recently published its new policy on regulatory and enforcement action. The […].

IT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

else 9.9: We Got Yer Star Trek Right Here

John Battelle's Searchblog

'The post else 9.9: We Got Yer Star Trek Right Here appeared first on John Battelle's Search Blog. This week in our round up we look at near-future advances in body scanners, self-driving sensors, and robots. We also read about what happens next as the internet’s fundamental trust architecture is on shaky grounds with the latest NSA revelations.

More Trending

article thumbnail

FTC Seeks Input on Another COPPA Parental Consent Mechanism Proposal

Hunton Privacy

On September 9, 2013, the Federal Trade Commission announced that it is seeking public comment on another proposed mechanism (submitted by Imperium, LLC) to obtain verifiable parental consent in accordance with the new Children’s Online Privacy Protection Rule (the “COPPA Rule”) that came into effect July 1, 2013. This announcement follows on the heels of a similar recent announcement that the Commission is seeking public comment on a parental consent mechanism proposed by a different company.

Privacy 40
article thumbnail

UK ICO Publishes New Guidance on Direct Marketing

Hunton Privacy

On September 10, 2013, the UK Information Commissioner’s Office (“ICO”) published new guidance on direct marketing (the “Guidance”). The Guidance explains the application of the two principal legislative instruments that affect direct marketing in the UK: (1) the Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”), which relates specifically to direct marketing; and (2) the Data Protection Act 1998 (the “DPA”), which governs data protection issues generally.

article thumbnail

German DPAs Pass Resolution on PRISM, Tempora and XKeyscore

Hunton Privacy

On September 5, 2013, the 16 German state data protection authorities and the Federal Commissioner for Data Protection and Freedom of Information (the “DPAs”) passed a resolution concerning recent revelations about the PRISM, Tempora and XKeyscore surveillance programs. The DPAs were critical of the programs, indicating that more should be done to understand their scope, especially since the programs raise serious constitutional concerns in Germany.

article thumbnail

UK ICO Publishes Guidance for Companies Receiving Unwanted Marketing

Hunton Privacy

On September 10, 2013, the UK Information Commissioner’s Office (“ICO”) published guidance for companies receiving unwanted marketing (the “Guidance”). This Guidance was published as part of a broader focus on unwanted marketing in the UK. The Guidance focuses on the application of the Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”), which govern the sending of marketing communications by electronic means, such as telephone, fax, email and text message.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Evolving Chinese Regulations Both Expand and Restrict Access to Corporate Information

Hunton Privacy

Recent news reports regarding the alleged purchase of personal information by a corporate investigative service firm in Shanghai have raised questions about the possibility of obtaining information about domestic Chinese companies from government corporate registration agencies. In China, the corporate registration authority is the State Administration for Industry and Commerce (the “SAIC”) and its local counterparts.

Access 40
article thumbnail

California Bill Would Require Notification for Breaches Involving Online Account Credentials

Hunton Privacy

On September 4, 2013, California state legislators passed an amendment to the state’s breach notification law. The bill, SB 46 , would expand notification requirements to include security incidents involving the compromise of personal information that would permit access to an online or email account. Pursuant to SB 46, the definition of “personal information” contained in Sections 1798.29 and 1798.82 of California’s Civil Code would be amended to include “a user name or email address, in combin

article thumbnail

A road-map to sending “commercial electronic messages” under CASL

Privacy and Cybersecurity Law

Let’s take stock of the information currently available on Canada’s Anti-Spam Legislation (CASL). First, there is the Act itself. Next, […].