Sat.Jul 09, 2016 - Fri.Jul 15, 2016

article thumbnail

5 useful tips to bulletproof your credit cards against identity theft

Elie

Here are the 5 ways I bulletproof my credit cards against identity theft, and you can use them yourself very easily. As a bonus, at the end of the post I have added an experimental step to defend against the recent chip downgrading attack.

62
article thumbnail

FTC Issues Warning Letters to Companies Falsely Claiming APEC CBPR Certification

Hunton Privacy

On July 14, 2016, the Federal Trade Commission issued warning letters to 28 companies relating to apparent false claims of participation in the APEC Cross-Border Privacy Rules (“CBPR”). The warning letters state that the companies’ websites represent APEC CBPR certification even though the companies do not appear to have undertaken the necessary steps to claim certification, such as a review and approval process by an APEC-recognized Accountability Agent.

Privacy 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Shield gets approval: certainty at last??

Privacy and Cybersecurity Law

The European Commission yesterday issued an adequacy decision adopting the EU-US Privacy Shield, which replaces Safe Harbor as a framework […].

Privacy 40
article thumbnail

European Commission Adopts Privacy Shield

Hunton Privacy

On July 12, 2016, the EU Commissioner for Justice, Consumers and Gender Equality, V?ra Jourová, and U.S. Secretary of Commerce Penny Pritzker announced the formal adoption of the EU-U.S. Privacy Shield (the “Privacy Shield”) framework, composed of an Adequacy Decision and accompanying Annexes. The Privacy Shield is designed to protect the fundamental rights of individuals whose personal data is transferred to the U.S. and ensure legal certainty for businesses with respect to transatlantic transf

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK Government Ends NHS Patient Database Scheme

Hunton Privacy

On July 6, 2016, the UK government decided to close its controversial care.data scheme after concerns were raised about the safeguards in place to protect individuals’ health care data and issues with patient transparency. Under the care.data scheme, all National Health Service (“NHS”) patients’ health care data was held in a central database. The NHS claimed that the program would benefit patients through improved knowledge of drug performance, greater budget efficiencies and an ability to comp