Remove media
article thumbnail

Proof of Concept: The Corporate Risk of Using Social Media

Data Breach Today

Also: Navigating US Privacy Laws; Ransomware Trends In the latest "Proof of Concept," Lisa Sotto of Hunton Andrews Kurth LLP and former CISO David Pollino of PNC Bank join ISMG editors to discuss the many new privacy laws in the U.S.,

Risk 246
article thumbnail

Data Privacy in the Age of AI

AIIM

Data privacy and Artificial Intelligence (AI) are two of biggest issues in the information spaces today. However, despite the enormous amount of coverage they receive in the trade and general media, what is not yet well understood is how tightly intertwined they are, and how risky it can be to address them without a proper foundation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia: Increased privacy penalties and binding social media code tabled

DLA Piper Privacy Matters

a framework for a binding online privacy code for social media and certain other online platforms. a framework for a binding online privacy code for social media and certain other online platforms. The Online Privacy Bill represents the first of the proposed legislative changes. Online privacy code.

Privacy 118
article thumbnail

Data privacy examples

IBM Big Data Hub

These are just some examples of how organizations support data privacy , the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate the importance of data privacy for businesses today.

article thumbnail

Pressure Mounts on Meta to Scrap 'Pay or OK' Model in EU

Data Breach Today

EU Lawmakers Say Privacy Shouldn't Be for Sale Facebook's attempt to navigate European privacy regulations by giving users a fee-based opt-out from behavioral advertising triggered backlash from more than a dozen European politicians who accused the social media giant of treating human rights as a commodity.

Sales 285
article thumbnail

GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

The Last Watchdog

The rise of social media has added to the many user-friendly digital tools scammers, sextortionists, and hackers can leverage in order to manipulate their victims. Cybersecurity has similarly developed as a necessary countermeasure to prevent scammers from rampaging the privacies of citizens.

article thumbnail

The New Era of Social Media Looks as Bad for Privacy as the Last One

WIRED Threat Level

The slow-motion implosion of Elon Musk’s X has given rise to a slew of competitors, where privacy invasions that ran rampant over the past decade still largely persist.

Privacy 92