Remove tag tech-policy-and-law
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

On the downside, because of their almost constant presence, the devices can facilitate an all-encompassing capture of personal information, intended and unintended, which, for example, can run afoul of workplace privacy laws. These devices are no longer relegated to science fiction and spy thrillers. What is the Internet of Bodies?

article thumbnail

Keeping Up with New Data Protection Regulations

erwin

California recently passed a law that gives residents the right to control the data companies collect about them. Many of these organizations will recall a number of stressful weeks – or even months – tidying up their databases and their data management processes and policies. employees).

GDPR 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four use cases defining the new wave of data management

IBM Big Data Hub

Others have come into sharper focus relatively recently: a global effort to create new data privacy laws, a post-pandemic expectation by customers to know them individually across all touchpoints, and increased attention on any racial, gender-based, or socioeconomic bias in AI models.

article thumbnail

Thoughts on the Legal Technology Implications of Dynamic Communication Practices

eDiscovery Daily

Issue tagging is one. E-discovery is a prime example of an area where legal technology/operations is seeing the challenges presented by legal professionals’ level of familiarity with computing options, particularly those technologies that form the dynamic changes in how professionals communicate. E-discovery is one example of this.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Microsoft Office Green tech Smart phones Collaboration 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0 Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's also an era where this sort of information is constantly leaked to unauthorised parties; last year Equifax lost control of 145.5 Sooner or later, big repositories of data will be abused. Of course it can!

Security 111
article thumbnail

On The Problem of Money, Politics, and SOPA

John Battelle's Searchblog

Those of you who have visited Marin might understand why for me, after more than 25 years of working across the bridge in San Francisco and on planes around the world, I find it rather pleasant to just stay in my office and Think Big Thoughts whenever possible. The battle over SOPA and PIPA is a signal event in the history of our industry.

Mining 111