Sat.May 03, 2014 - Fri.May 09, 2014

article thumbnail

Viacom v. Cable One: A Foreshadowing of Things To Come in The Battle for the Open Web?

John Battelle's Searchblog

'The post Viacom v. Cable One: A Foreshadowing of Things To Come in The Battle for the Open Web? appeared first on John Battelle's Search Blog. Viacom’s rather one-sided POV on why its blocked web access for Cable One providers. Image via @TheLadyH86. So it’s come to this. We’re all familiar with disputes between cable providers and their content partners – it happens all the time.

Access 100
article thumbnail

FTC Announces Settlement with Snapchat After Alleged Privacy and Security Misrepresentations

Hunton Privacy

On May 8, 2014, the Federal Trade Commission announced a proposed settlement with Snapchat, Inc. (“Snapchat”) stemming from allegations that the company’s privacy policy misrepresented its privacy and security practices, including how the Snapchat mobile app worked. Snapchat’s app supposedly allowed users to send and receive photo and video messages known as “snaps” that would “disappear forever” after a certain time period.

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Else 5.5.14: Stay Sober, My Friend (And Watch Your F8)

John Battelle's Searchblog

'The post Else 5.5.14: Stay Sober, My Friend (And Watch Your F8) appeared first on John Battelle's Search Blog. ( image ) Cinco de Mayo on a Monday? What fresh hell is this? Just another week of links worth reading, if you care about the most muscular narrative in our beer-goggled world. Facebook (and Wired) dominated thanks to news from it F8 developer conference, but policy and politics were not far behind.

IT 81
article thumbnail

FTC Announces Settlement with American Apparel for Falsely Claiming Compliance with the Safe Harbor Framework

Hunton Privacy

On May 9, 2014, the Federal Trade Commission announced a settlement with clothing manufacturer American Apparel related to charges that the company falsely claimed to comply with the U.S.-EU Safe Harbor Framework. According to the FTC’s complaint , the company violated Section 5 of the FTC Act by deceptively representing, through statements in its privacy policy, that it held a current Safe Harbor certification even though it had allowed the certification to expire.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Bojana Bellamy Selected to Participate in EU-U.S. Privacy Bridge Initiative

Hunton Privacy

Hunton & Williams LLP’s Centre for Information Policy Leadership president, Bojana Bellamy , has been selected to participate in the “Privacy Bridge Project,” a new transatlantic initiative that seeks to develop practical solutions to bridge the gap between European and U.S. privacy regimes. Bellamy joins a distinguished group of approximately 20 privacy experts from the EU and U.S., convened by Jacob Kohnstamm, Chairman of the Dutch Data Protection Authority and former Chairman of the Artic

Privacy 40

More Trending

article thumbnail

CFPB Proposes New GLB Privacy Notice Rule

Hunton Privacy

On May 6, 2014, the Consumer Financial Protection Bureau (“CFPB”) announced a new proposed rule impacting privacy notices that financial institutions are required to issue under the Gramm-Leach-Bliley Act (“GLB”). Under the current GLB Privacy Rule, financial institutions must mail an annual privacy notice (the “GLB Privacy Notice”) to their customers that sets forth how they collect, use and disclose those customers’ nonpublic personal information (“NPI”) and whether customers may limit such sh

Privacy 40
article thumbnail

SEC Issues New Guidance on the Use of Social Media

Hunton Privacy

On April 21, 2014, the Securities and Exchange Commission’s Division of Corporation Finance published new Compliance and Disclosure Interpretations (“C&DIs”) concerning the use of social media in certain securities offerings, business combinations and proxy contests. Notably, the C&DIs permit the use of an active hyperlink to satisfy the cautionary legend requirements in social media communications when the social media platform limits the text or number of characters that may be include

article thumbnail

GPEN Announces Coordinated International Enforcement Sweep on Mobile App Privacy

Hunton Privacy

On May 6, 2014, the Office of the Privacy Commissioner of Canada announced the Global Privacy Enforcement Network’s (“GPEN’s”) second annual enforcement sweep. The sweep will focus on mobile app privacy and how mobile apps collect and use personal data. From May 12 to 18, 2014, GPEN member authorities “will be looking at the types of permissions an app is seeking, whether those permissions exceed what would be expected based on the app’s functionality, and most importantly from a transparency pe

Privacy 40
article thumbnail

German Court Requires Clear Opt-Out Notices for Web Analytics

Hunton Privacy

On February 18, 2014, the Frankfurt am Main Regional Court issued a ruling addressing the use of opt-out notices for web analytics tools. The case concerned Piwik web analytics software and its “AnonymizeIP” function. The court held that website users must be informed clearly about their right to object to the creation of pseudonymized usage profiles.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.