Remove tag privacy-rights
article thumbnail

My Experience at the Washington DC Masters Conference

eDiscovery Daily

Clark with Right Discovery, Jason Voss with Converse Data, Nick Eglevsky with Blank Rome, Mable Tun with Freddie Mac, Alicia Clausen with Crowell Moring, and Amanda Strassner Merrill with Capital One. The main takeaways were: AI in Data Privacy, Where to Begin? The panel consisted of Kevin M. Introducing Profiler.AI

article thumbnail

Illinois Court Says Biometric Fingerprint is Violation of Privacy, Even Without Injury: Data Privacy Trends

eDiscovery Daily

According to The Verge ( Crucial biometric privacy law survives Illinois court fight , written by Russell Brandom), Illinois’ Biometric Information Privacy Act (or BIPA), passed in 2008, requires affirmative consent for companies to collect biometric markers from their customers, including fingerprints and facial recognition models.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Wants You to Send Them Your Naked Pictures to Prevent Revenge Porn. I’m Not Kidding: Data Privacy Trends

eDiscovery Daily

It sounds crazy, right? Facebook says that it won’t be storing nude pictures but will use photo-matching technology to tag the images after they’re sent via its encrypted Messenger service. Facebook wants you to stop worrying about your nudes being shared without your consent by actually sending it your nude photos. Good question.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. One essential step is developing the DT business case and connecting it with the critical success factors (CSFs) and the product scope. This is a best-case scenario. So, at the outset, a good question to ask is What is DT ?

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

But right now, pure AI can be programmed for many tasks that require thought and intelligence , as long as that intelligence can be gathered digitally and used to train an AI system. When thinking of artificial intelligence (AI) use cases, the question might be asked: What won’t AI be able to do?

article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

The only way to tackle this challenge is to educate the users about these threats and their potential implications. To put in simple terms, it refers to the process of providing a web application with JavaScript tags on input. IoT devices are exposed to cybersecurity vulnerabilities. Poor credentials. Malware, phishing, and web.

IoT 129
article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. It seems that preparing for, or even playing a game of capture the flag, might be a great way to expose any educational gaps, if not generally improve and deepen the security skills, you might already possess. But what about the basics?