SlideShare a Scribd company logo
Should there be limits on access to information? Ian Brown, FIPR
Overview ,[object Object],[object Object],[object Object],[object Object]
Data trails ,[object Object],[object Object],[object Object]
Web server logs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-mail trails Messages are full of clues about their origins
Regulation of Investigatory Powers Act 2000 ,[object Object],[object Object],[object Object]
“ Snooper’s charter” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anti-Terrorism, Crime and Security Act 2001 ,[object Object],[object Object]
Other access ,[object Object],[object Object],[object Object]
Watermarked data ,[object Object],[object Object],(c) F. Petitcolas – Facade of  Notre Dame de  Fourvière  Basilica in Lyon
Trusted computing ,[object Object],[object Object],[object Object]
The end of rehabilitation? ,[object Object],[object Object],[object Object]
Actions ,[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Govt Ch 10 1
Govt Ch 10 1Govt Ch 10 1
Govt Ch 10 1
mrkampmann
 
Planeación de utilidades
Planeación de utilidadesPlaneación de utilidades
Planeación de utilidades
Cinelandia
 
Administración financiera aplus
Administración financiera aplusAdministración financiera aplus
Administración financiera aplus
Maestros Online
 
Usos Del Punto De Equilibrio
Usos Del Punto De EquilibrioUsos Del Punto De Equilibrio
Usos Del Punto De Equilibrio
Abdon Luppi
 
Plan de utilidades
Plan de utilidadesPlan de utilidades
Plan de utilidades
Kariola M
 
El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...
El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...
El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...
ALFREDO GARCIA
 
Relación costo - volumen - utilidad.
Relación costo - volumen - utilidad.Relación costo - volumen - utilidad.
Relación costo - volumen - utilidad.
yendris
 
Trabajo punto de equilibrio
Trabajo punto  de  equilibrioTrabajo punto  de  equilibrio
Trabajo punto de equilibrio
hvenegas03
 
El Punto De Equilibrio
El Punto De EquilibrioEl Punto De Equilibrio
El Punto De Equilibrio
Luis Enrique Pacheco Rocha
 

Viewers also liked (9)

Govt Ch 10 1
Govt Ch 10 1Govt Ch 10 1
Govt Ch 10 1
 
Planeación de utilidades
Planeación de utilidadesPlaneación de utilidades
Planeación de utilidades
 
Administración financiera aplus
Administración financiera aplusAdministración financiera aplus
Administración financiera aplus
 
Usos Del Punto De Equilibrio
Usos Del Punto De EquilibrioUsos Del Punto De Equilibrio
Usos Del Punto De Equilibrio
 
Plan de utilidades
Plan de utilidadesPlan de utilidades
Plan de utilidades
 
El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...
El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...
El modelo costo – volumen – utilidad y su aplicación en la empresa en el proc...
 
Relación costo - volumen - utilidad.
Relación costo - volumen - utilidad.Relación costo - volumen - utilidad.
Relación costo - volumen - utilidad.
 
Trabajo punto de equilibrio
Trabajo punto  de  equilibrioTrabajo punto  de  equilibrio
Trabajo punto de equilibrio
 
El Punto De Equilibrio
El Punto De EquilibrioEl Punto De Equilibrio
El Punto De Equilibrio
 

Similar to Should there be limits on access to information?

Communications security for journalists
Communications security for journalistsCommunications security for journalists
Communications security for journalists
blogzilla
 
Marsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentMarsden net neutrality in the European Parliament
Marsden net neutrality in the European Parliament
Chris Marsden
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
anthonywong
 
Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
anthonywong
 
Trans border data flow
Trans border data flowTrans border data flow
Trans border data flow
SudeshnaDatta6
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
Areniym Lovelova
 
Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...
Salvatore D'Agostino
 
Regulating and Implementing Network Neutrality
Regulating and Implementing Network NeutralityRegulating and Implementing Network Neutrality
Regulating and Implementing Network Neutrality
Chris Marsden
 
Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013
Chris Marsden
 
Lec3chap2f04
Lec3chap2f04Lec3chap2f04
Lec3chap2f04
screaminc
 
Open Data - Opportunities for Researchers and Developers
Open Data - Opportunities for Researchers and DevelopersOpen Data - Opportunities for Researchers and Developers
Open Data - Opportunities for Researchers and Developers
Fingal Open Data
 
Technology Trends: Value Office
Technology Trends: Value OfficeTechnology Trends: Value Office
Technology Trends: Value Office
SSFIndia1
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
safa
 
حرية الإعلام
حرية الإعلامحرية الإعلام
The Lord Chancellor's very late reply to my FOI Request about his travel expe...
The Lord Chancellor's very late reply to my FOI Request about his travel expe...The Lord Chancellor's very late reply to my FOI Request about his travel expe...
The Lord Chancellor's very late reply to my FOI Request about his travel expe...
bjknight
 
Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)
Lance Michalson
 
20120822 schubert alpbach_final
20120822 schubert alpbach_final20120822 schubert alpbach_final
20120822 schubert alpbach_final
ISPA - Internet Service Providers Austria
 
IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.
J. David Morris
 
Sydney 22 March: EU neutrality
Sydney 22 March: EU neutralitySydney 22 March: EU neutrality
Sydney 22 March: EU neutrality
Chris Marsden
 
Lauriault access donneesnumeriques_legal@it__04042011
Lauriault access donneesnumeriques_legal@it__04042011Lauriault access donneesnumeriques_legal@it__04042011
Lauriault access donneesnumeriques_legal@it__04042011
Communication and Media Studies, Carleton University
 

Similar to Should there be limits on access to information? (20)

Communications security for journalists
Communications security for journalistsCommunications security for journalists
Communications security for journalists
 
Marsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentMarsden net neutrality in the European Parliament
Marsden net neutrality in the European Parliament
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
 
Trans border data flow
Trans border data flowTrans border data flow
Trans border data flow
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...
 
Regulating and Implementing Network Neutrality
Regulating and Implementing Network NeutralityRegulating and Implementing Network Neutrality
Regulating and Implementing Network Neutrality
 
Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013
 
Lec3chap2f04
Lec3chap2f04Lec3chap2f04
Lec3chap2f04
 
Open Data - Opportunities for Researchers and Developers
Open Data - Opportunities for Researchers and DevelopersOpen Data - Opportunities for Researchers and Developers
Open Data - Opportunities for Researchers and Developers
 
Technology Trends: Value Office
Technology Trends: Value OfficeTechnology Trends: Value Office
Technology Trends: Value Office
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
حرية الإعلام
حرية الإعلامحرية الإعلام
حرية الإعلام
 
The Lord Chancellor's very late reply to my FOI Request about his travel expe...
The Lord Chancellor's very late reply to my FOI Request about his travel expe...The Lord Chancellor's very late reply to my FOI Request about his travel expe...
The Lord Chancellor's very late reply to my FOI Request about his travel expe...
 
Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)
 
20120822 schubert alpbach_final
20120822 schubert alpbach_final20120822 schubert alpbach_final
20120822 schubert alpbach_final
 
IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.
 
Sydney 22 March: EU neutrality
Sydney 22 March: EU neutralitySydney 22 March: EU neutrality
Sydney 22 March: EU neutrality
 
Lauriault access donneesnumeriques_legal@it__04042011
Lauriault access donneesnumeriques_legal@it__04042011Lauriault access donneesnumeriques_legal@it__04042011
Lauriault access donneesnumeriques_legal@it__04042011
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
blogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
blogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
blogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
blogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
blogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
blogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
blogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
blogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
blogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
blogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
blogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
blogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
blogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
blogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
blogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
blogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
blogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Should there be limits on access to information?