Remove tag consumer-protection
article thumbnail

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

The Last Watchdog

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. Assuming privacy concerns get addressed, much wider consumer uses are envisioned in areas such as marketing, retailing and health services. Related: Drivers behind facial recognition boom.

Privacy 153
article thumbnail

California proposes rules for automated decision-making

Data Protection Report

On November 27, 2023, the California Privacy Protection Agency (“CPPA”) released a first draft of rules for automated decision-making technologies under California’s privacy law. The proposed rules revolve around providing notice of the technology’s use, opting out, and consumer access to business information.

Access 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why modern data management and governance is essential in energy and utilities

Collibra

Changing consumption patterns and consumer demand. A shift in consumer sentiment, energy consumption patterns and growing pressure from policymakers is a catalyst for energy and utilities providers to diversify their business by adding renewable energy options to their product portfolio and implementing new business models. Next Steps.

article thumbnail

Do I Need a Data Catalog?

erwin

Organizations need a data catalog because it enables them to create a seamless way for employees to access and consume data and business assets in an organized manner. For example, Amazon handles millions of different products, and yet we, as consumers, can find almost anything about everything very quickly.

Metadata 132
article thumbnail

What’s new in OpenText Axcelerate

OpenText Information Management

Other recent Axcelerate enhancements include: End-to-end eDiscovery support for audio and video (AV) files – Get the most efficient review of voluminous AV content. Undo Tagging Operations. Administrators can now use a command-line (undo.bat) to undo bulk or single tag operations. Let’s take a closer look. PostgreSQL.

article thumbnail

Weekly Vulnerability Recap – October 9, 2023 – Zero-Days Strike Android, Microsoft, Apple, Cisco & More

eSecurity Planet

Researchers from Google’s Threat Analysis Group (TAG) and Project Zero uncovered the weakness, which is connected to unauthorized access to freed memory, possibly allowing attackers to corrupt or change sensitive data. Email Address By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy.

Libraries 104
article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.