Privacy professionals
fromThe Hill
6 hours agoCan AI agents protect our privacy?
AI is transforming the web, increasing privacy risks while offering opportunities to improve data protection.
The global Tinder expansion is one of the biggest tests yet for World, and the company's bet that everyday consumers will be willing to sign up for biometric verification services to use internet applications.
"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
"In a prior life, I was briefly and mildly Internet famous for my activism and advocacy work. The subsequent intrusions on my life and physical safety became a shocking revelation in how exposed I was, and I found myself scrambling to lock everything down."
Connected vehicles are becoming software-defined, sensor-rich, and permanently online. This evolution expands both legal exposure across sectors and legal frameworks that were traditionally unfamiliar for the automotive and transportation industry: (i) telecoms licensing and cross-border connectivity, (ii) data protection and data-sharing (e.g. with insurers/ad-tech), (iii) cybersecurity and safe Over-The-Air (OTA) governance, (iv) product liability for automated/Advanced Driver Assistance Systems (ADAS) features, (v) eCall obligations amid 2G/3G mobile network sunsets, (vi) national-security supply-chain controls, and (vii) IP disputes.
What if I told you that everything you know and everything you do to ensure quality backups is no longer viable? In fact, what if I told you that in an era of generative AI, when it comes to backups, we're all pretty much screwed?
QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Session replay tools capture different types of user actions. Some tools focus on DOM-level signals like clicks, scrolls, and heatmaps. Others provide full video-style replays of user sessions. Because capabilities vary so widely, you need to understand exactly what data a tool collects and the privacy risk that comes with it.
In 1973, long before the modern digital era, the US Department of Health, Education, and Welfare (HEW) published a report called "Records, Computers, and the Rights of Citizens." Networked computers seemed "destined to become the principal medium for making, storing, and using records about people," the report's foreword began. These systems could be a "powerful management tool." But with few legal safeguards, they could erode the basic human right to privacy - particularly "control by an individual over the uses made of information about him."