Remove world freedom-of-speech
article thumbnail

UK: Data Reform Bill: post-Brexit data reforms

DLA Piper Privacy Matters

Today, through the Queen’s Speech, the UK Government has set out its legislative program for the next Parliamentary term. The speech outlined 38 proposed laws, including the Data Reform Bill. Today’s Queen’s Speech is the next formal step in the legislative process with publication of a Bill now likely in the summer.

Paper 97
article thumbnail

Tech firms suspend use of ‘biased’ facial recognition technology

Security Affairs

IBM firmly opposes and will not condone uses of any technology, including facial recognition technology offered by other vendors, for mass surveillance, racial profiling, violations of basic human rights and freedoms, or any purpose which is not consistent with our values and Principles of Trust and Transparency.”

Sales 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Controlling speech

InfoGovNuggets

How does one control speech in the public forum without encroaching upon fundamental freedoms? Blocking some speech and some speakers would be bad if the government did it. Are the Facebooks and Googles of the world mere utilities getting paid solely for carrying content from all comers, with no power (or financial interest?)

article thumbnail

New Independent Commission on Internet Governance Launched

Hunton Privacy

On January 22, 2014, at the World Economic Forum in Davos-Klosters, Switzerland, Sweden’s Minister for Foreign Affairs Carl Bildt announced the creation of a new independent commission that will examine the future of Internet governance. systemic risks, including establishing cyber crime cooperation.

article thumbnail

LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack

Krebs on Security

Gold farming is particularly prevalent in massively multiplayer online role-playing games (MMORPGs), such as RuneScape and World of Warcraft. “This is the practice of selling virtual goods in games for real world money. In 2019, a Canadian company called Defiant Tech Inc. pleaded guilty to running LeakedSource[.]com

Passwords 192
article thumbnail

Weekly Podcast: Russian cyber crimes, Facebook breach and Tory conference app

IT Governance

According to the NCSC, well-known threat actors that have carried out numerous cyber attacks around the world – including the groups known as APT 28, Fancy Bear, Sofacy, Sednit and CyberCaliphate – are in fact associated with the GRU. The Kremlin is yet to comment. A further 40 million users were also logged out as a precaution.

article thumbnail

Predictions 2012 #6: “The Corporation” Becomes A Central Societal Question Mark

John Battelle's Searchblog

United sanctified corporations as equivalent to you and I in terms of political speech; in 2011, we began to see the impact of that decision on our political process here in the US (in short, follow the money ). From a balance sheet prospective, corporations are in far, far better shape than just about every country in the world.

IT 101