Remove tag e-privacy-directive
article thumbnail

To dream like a human? Creative reflections on the age of AI

CILIP

It’s a long way from his early days, tinkering with mathematical rules to generate procedural images, but Peter’s approach has evolved for the age of Midjourney, DALL-E, et al. Ask for a dinosaur, it’s pretty straightforward – it looks for everything that’s tagged as a dinosaur and tries to make some kind of confluence of those things.

article thumbnail

EUROPE: e-Privacy Regulation – changes regarding electronic communications and digital marketing

DLA Piper Privacy Matters

Since the European Commission unveiled a proposal for an e-Privacy Regulation in January 2017, this new piece of legislation, aiming to adapt rules on electronic communications and cookies, has undergone many iterations. Key topics: current status in the Council’s draft e-Privacy Regulation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Using machine learning (ML), AI can understand what customers are saying as well as their tone—and can direct them to customer service agents when needed. In practice, this could mean guiding users to the appropriate resources, whether that’s connecting them with the right agent or directing them to user guides and FAQs.

article thumbnail

EU Commission Issues Recommendation on RFID, Privacy and Data Protection

Hunton Privacy

On May 12, 2009, the European Commission issued a long-awaited recommendation on the implementation of privacy and data protection principles in applications supported by radio-frequency identification (“RFID”). Companies and public authorities should develop a framework for privacy and data protection impact assessments.

Privacy 40
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Contesting the case, Six Flags argued it couldn’t be held liable unless the plaintiff demonstrated a tangible injury from the unauthorized collection, often a difficult task in privacy lawsuits. Oh, and a photo on social media can be discoverable simply because you’re “tagged” in it. COOPERATION. School District No.

article thumbnail

This is the old ChiefTech blog.: RSS's dirty little secret

ChiefTech

Basically, he only reads email directed to him, alone. Meanwhile Hasan Elahi has embraced it by publishing his day-to-day life in pictures on the web and a map that pinpoints his location (care of Wired ) - his says, " Ive discovered that the best way to protect your privacy is to give it away ".

Paper 40
article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

Kearns: My name is Megan Kearns and I am the project manager for picoCTF, it's developed in CMU, out of the CyLab security and privacy Institute and I've been with CMU for 10 years, and I worked in silos, for all of those 10 years, doing different things. So getting cybersecurity education materials often comes with a price tag.