The document discusses challenges to privacy protections posed by emerging technologies and uses of data. It summarizes that consent is becoming less meaningful online as privacy policies are complex and terms frequently change. Ubiquitous computing through devices and sensors raises issues as data is collected by default without notice or choice. Big data analysis makes it difficult to provide notice of future uses of data or obtain meaningful consent, while re-identification risks undermine anonymization as a solution. Overall, existing legal frameworks centered around notice and consent are struggling to address these new privacy realities.
A brief account of the current state of EU data protection laws accompanied by the suggestion they face almost insuperable challenge from the combination of the illusory nature of consent in most online contracts; the rise of big data as a "treasure hunt"; and the rise oambient environments for data colelction (the "Internet of Things") where design imperatives push towards an absence of opportunities for informed specific consent.
Can privacy survive the onslaught of online standard form "consent"; big data; and the Internet of Things? This paper wonders, and considers in particular the challenges of privacy and smart cities, which combine all three issues.
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
My presentation from IDnext 2015, the European Digital Identity Event. "UK government identity initiatives past, present, future: policy and technology perspectives"
A brief account of the current state of EU data protection laws accompanied by the suggestion they face almost insuperable challenge from the combination of the illusory nature of consent in most online contracts; the rise of big data as a "treasure hunt"; and the rise oambient environments for data colelction (the "Internet of Things") where design imperatives push towards an absence of opportunities for informed specific consent.
Can privacy survive the onslaught of online standard form "consent"; big data; and the Internet of Things? This paper wonders, and considers in particular the challenges of privacy and smart cities, which combine all three issues.
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
My presentation from IDnext 2015, the European Digital Identity Event. "UK government identity initiatives past, present, future: policy and technology perspectives"
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Slides to facilitate a conversation with school leaders & administrators around emerging issues related to Digital Citizenship. Both to raise awareness of the multifaceted nature of the subject and identify action items for schools moving forward.
The material here is taken from Mike Ribble's "Nine Elements of Digital Citizenship".
http://digitalcitizenship.net
A short introduction to multimedia forensics the science discovering the hist...Sebastiano Battiato
Thematic Meeting on MULTIMEDIA TRUTHFULNESS VERIFICATION IN LEGAL ENVIRONMENT AND SOCIAL MEDIA
Co-located with WIFS 2015, Roma - Italy, 16 November 2015
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
The identity [r]evolution is happening. Who are
you, who am I in the information society ?
In recent years, the convergence of several factors – technological, political, economic –
has accelerated a fundamental change in our networked world. On a technological level, information
becomes easier to gather, to store, to exchange
and to process. The belief that more information
brings more security has been a strong political
driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one’s behaviour, or needs, or preferences. It can lead to
categorizations according to some specific risk criteria, for example, or to direct and personalized
marketing. As a consequence, new forms of identities appear. They are not necessarily related to our
names anymore. They are based on information,
on traces that we leave when we act or interact,
when we go somewhere or just stay in one place,
or even sometimes when we make a choice. They
are related to the SIM cards of our mobile phones,
to our credit card numbers, to the pseudonyms
that we use on the Internet, to our email addresses,
to the IP addresses of our computers, to our profiles… Like traditional identities, these new forms of
identities can allow us to distinguish an individual
within a group of people, or describe this person as
belonging to a community or a category.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Algorithms are taking control of our information rich world. As the twin sibling to Big Data, increasingly they decide how society views us via constructed profiles (as criminals? as terrorists? as rich or poor consumers?); what we see as important, newsworthy, cool or profitable (eg Twitter trending topics, automated stock selling, Amazon recommendations, BBC website top news topics etc); and indeed what we see at all as algorithms are increasingly used to filter our illegal or undesirable content as tools of public policy. Algorithms are peceived by virtue of their automation as neutral, objective and fair, unlike human decision makers - yet evidence increasingly shows the opposite - eg a series of legal complaints assert that Google games its own search results to promote its own economic interests and demote those of competitors or annoyances; while in the defamation field, French, German and Italian courts have decided that algorithmically generated autosuggests in search can be libellous (eg "Bettina Wolf prostitute"). . This paper asks if any legal remedies do or should exist to *audit* proprietary algorithms , given their importance, and asks if one way forward might be via existing and future subject access rights to personal data in EU data protection law. The transformation of these rights as proposed in the draft Data Protection Regulation is not however hopeful.
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
A number of technological systems , sometimes known as "digital wills" are appearing on the market to help people bequeath digital assets such as passwords, emails, virtual game assets etc. Do these help provide a legal solution? Or do they merely confuse further a landscape alreqdy lacking good practice?
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Slides to facilitate a conversation with school leaders & administrators around emerging issues related to Digital Citizenship. Both to raise awareness of the multifaceted nature of the subject and identify action items for schools moving forward.
The material here is taken from Mike Ribble's "Nine Elements of Digital Citizenship".
http://digitalcitizenship.net
A short introduction to multimedia forensics the science discovering the hist...Sebastiano Battiato
Thematic Meeting on MULTIMEDIA TRUTHFULNESS VERIFICATION IN LEGAL ENVIRONMENT AND SOCIAL MEDIA
Co-located with WIFS 2015, Roma - Italy, 16 November 2015
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
The identity [r]evolution is happening. Who are
you, who am I in the information society ?
In recent years, the convergence of several factors – technological, political, economic –
has accelerated a fundamental change in our networked world. On a technological level, information
becomes easier to gather, to store, to exchange
and to process. The belief that more information
brings more security has been a strong political
driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one’s behaviour, or needs, or preferences. It can lead to
categorizations according to some specific risk criteria, for example, or to direct and personalized
marketing. As a consequence, new forms of identities appear. They are not necessarily related to our
names anymore. They are based on information,
on traces that we leave when we act or interact,
when we go somewhere or just stay in one place,
or even sometimes when we make a choice. They
are related to the SIM cards of our mobile phones,
to our credit card numbers, to the pseudonyms
that we use on the Internet, to our email addresses,
to the IP addresses of our computers, to our profiles… Like traditional identities, these new forms of
identities can allow us to distinguish an individual
within a group of people, or describe this person as
belonging to a community or a category.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Algorithms are taking control of our information rich world. As the twin sibling to Big Data, increasingly they decide how society views us via constructed profiles (as criminals? as terrorists? as rich or poor consumers?); what we see as important, newsworthy, cool or profitable (eg Twitter trending topics, automated stock selling, Amazon recommendations, BBC website top news topics etc); and indeed what we see at all as algorithms are increasingly used to filter our illegal or undesirable content as tools of public policy. Algorithms are peceived by virtue of their automation as neutral, objective and fair, unlike human decision makers - yet evidence increasingly shows the opposite - eg a series of legal complaints assert that Google games its own search results to promote its own economic interests and demote those of competitors or annoyances; while in the defamation field, French, German and Italian courts have decided that algorithmically generated autosuggests in search can be libellous (eg "Bettina Wolf prostitute"). . This paper asks if any legal remedies do or should exist to *audit* proprietary algorithms , given their importance, and asks if one way forward might be via existing and future subject access rights to personal data in EU data protection law. The transformation of these rights as proposed in the draft Data Protection Regulation is not however hopeful.
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
A number of technological systems , sometimes known as "digital wills" are appearing on the market to help people bequeath digital assets such as passwords, emails, virtual game assets etc. Do these help provide a legal solution? Or do they merely confuse further a landscape alreqdy lacking good practice?
What do we do with aproblem like revenge porn ?Lilian Edwards
Revenge porn is a vile and growing phenomenon. Thuis talk discusses its origins and gendered nature, what UK criminal law applies to stop it, and what other solutions there might be eg faster take down by socuial networks, the "right to be forgotten"
Discussion of the main elements of the draft Data Protection Regulation: what difference will it make to industry practice and user rights to control their data?
IT law : the middle kingdom between east and WestLilian Edwards
Privacy as a value is often as conflicting with and less important than other major societal goals such as nation state secureity and business profits. China as a socialist state emerging a a major digital economuic force may fall prey to both these assumptions. However the recent history in the West shows that over zealous national secueity infringing citizen privacy, as revealed in the recent Snowden PRISM/TEMPORA etc scandals, may backlash against business profits as well as reducing citizen trust in security.China can learn from these lessons as it expands its own privacy law especially in the IT/telecoms area.
Be careful what you wish for! How the GDPR even now it has been finalised may not solve the key problems of rthe tech community of what is personal data and what is anonymised/pseudonymous.
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
At our Spring East Midlands Cyber Security event on the Impact of the General Data Protection Regulation, Lilian Edwards looked at the basics on what you need to know about the new regulation.
http://qonex.com/east-midlands-cyber-security-forum/
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
Privacy, the Internet of Things and Smart Cities Lilian Edwards
Updated version of my paper, delivered Florence spring 2016. How can we obtain consent to sharing of personal data in a ubiquitous/ioT environment? is it possible given the requeirements of the GDPR and E-Privacy Directive?
How problems with data protection affect science researchers, especially when sharing large datasets with researchers around the globe: issues and solutions?
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation is designed to update the current legislation which was drafted in a time that was in technology terms, prehistoric.
The Data Protection Directive, drafted back in 1995, harks back to a time when data processing was more about filing
cabinets than data rack enclosures. It’s time to evolve.
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
AI regulation has been a hot topic since the rise of machine learning (ML) in the “big data” era, but generative AI or “foundation models” tools like ChatGPT, DALL-E 2(now 3) and CoPilot, ike ML before them, may create serious societal risks, including embedding and outputting bias; generating fake news, illegal or harmful content and inadvertent “hallucinations”; infringing existing laws relating eg to copyright and privacy; as well as environmental, competition and workplace concerns.
Many nations are now considering regulation to address these worries, and can draw on a number of basic and hybrid models of governance. This paper canvasses models of mandatory comprehensive legislation (where the EU AI Act hopes to place itself as a gold standard model); vertical mandatory legislation (where China has quietly taken a lead); adapting existing law (see the many copyright lawsuits underway); and voluntary “soft law” such as codes of ethics, “blueprints”, or industry guidelines. Both the domestic and international regulatory scenes for AI are also increasingly politicised as the rise of "AI safety" hype shows. Against this backdrop what choices should smaller countries such as the UK and Australia make? will international harmonisation lead to a race to the top as with the GDPR, or the bottom - rule by tech for tech?
How to regulate foundation models: can we do better than the EU AI Act?Lilian Edwards
This talk looks at
(a) the progress in regulating GPAI, renamed foundation models, by the EU AI Act as the EU parliament reaches a final text in May 2023
(b) what other laws exist to regulate generative AI meanwhile , notably copyright and the GDPR (latter dealt with in detail here https://www.slideshare.net/lilianed/can-chatgpt-be-compatible-with-the-gdpr-discuss )
Can ChatGPT be compatible with the GDPR? Discuss.Lilian Edwards
Since the Italian Garantie became the first DP authority in the world to even temporarily ban ChatGPT, debate has broken out as to whether generative AI models can comply with data protection laws, not just in the GDPR but around the world. The use of personal data for training requires a legal basis which is hard to find, special category data raises special problems (duh) and the model itself may be considered personal data due to inversion attacks and data leakage in outputs. Hallucination presents seemingly insuperable problems as to accuracy and rectification. Even though Open AI have temporarily satisfied the Garantie, further disputes still seem likely to eventually reach the courts. In this talk I will attempt to throw the entirety of DP law against the wall of large language and image models and even, jut for fun, raise the spectre of whether AI models can libel
Brief summary of how the law and legal practice may be affected by the ris of AI and autonomous cars, robots, etc - with a look at what harms or biases may result and how law and the market might try to solve those problems.
If the UK leaves the EU and EEA, will it be "adequate" for data transfers from the EU? Evidemnce suggests not, especially following the passing of the IP Act and the Tele2/Watson CJEU decision.
Updated vesion of my talk from 2013 as given in March 2016.
Coves the basics of why algorithmic governance may be problematic for users and society and suggests some legal remedies for these problems including competition law and defamation law.
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
Short paper by Laurence Diver and myself on why the IoT is a special problem for privacy and how we can and should try to build such systems using Privacy by Design
UK copyright, online intermediaries and enforcementLilian Edwards
What evidence do judges take into acount when they decide to block websites to prevent copyright infringement? Using case reports of s 97A CPDA cases in the UK, this paper shows a number of problems with judicial use of empirical evidnece especially as to whether blocking is effective.
An iterative update on my ongoing work on revenge porn and how to deal with it. This talk analyses recent legislation and Google's recent decision to extend the "right to be forgotten" to revenge porn and argues both forgiving (restorative justice) and forgetting (RTBF) may be more useful remedies than the crimainal law alone for victims.
the music industry has many problems, and , some would say, enemies. THis talk looks at some of these and summarises the outcomes to date of the "war on piracy". It also however foresees a newer threat - the algorithmic curation and , perhaps, creation, of popular music. Do we need new music and human musicians any more?
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
This paper (co-authored with lachlan Urquart of U of Nottingham) discusses if we have any expectations of privacy in content we make public on;line on social media - or can such content be data mined by the police at will? Should any kind of surveillance warrant be required of the police to use such material? has social jmedia become the new panopticon?
Robots are no longer creatures of science fiction nor even restricted to industrial and warfare contexts but moving into sensitive domnestic worlds such as homes, hospitals and schools. How will laws about liability, privacy, evidence etc apply in this brave new world? How do we avoid creating kneejerk moral panic laws which may restrict the vaule of robotics to society?
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
3. Q. Do people still care about privacy?
JAN 2010: Zuckerberg : “People have
really gotten comfortable not only
sharing more information and
different kinds, but more openly and
with more people.. privacy is no longer
a ‘social norm’ .”
JUNE 2013: Washington is using
"American-style Stasi methods," said
Markus Ferber MEP, of Chancellor
Angela Merkel's Bavarian sister party. "I
thought this era had ended when the
DDR fell”
6. Viviane Reding: Prism “shows
why a clear legal framework
for the protection of personal
data is not a luxury but a
necessity.”
Ron Paul: What most undermines the claims of the Administration and its
defenders about this surveillance program is the process itself. First the
government listens in on all of our telephone calls without a warrant and then if
it finds something it goes to a FISA court and gets an illegal approval for what it
has already done! This turns the rule of law and due process on its head.
7. In Europe, even UK(!) rising online privacy concerns
c 2010 on
C4, May 2010
8. Attitudes towards data protection
• 60% of Europeans who use the internet (40% of all
EU citizens) shop or sell things online and use social
networking sites.
• People disclose personal data, including biographical
information (almost 90%), social information
(almost 50%) and sensitive information (almost
10%) on these sites.
• 70% said they were concerned about how companies
use this data and they think that they have only
partial, if any, control of their own data.
• 74% want to give their specific consent before their
data is collected and processed on the Internet.
EC citizen attitudes towards data privacy –
EuroBarometer 2011
9. Reform of the Data Protection Directive (DPD) ?
January 2012 Draft General Regulation
• Main issues
– Combine rules on DP police & LEAs sector with existing rules for
“civilian” data controllers? (in fact kept separate)
– Address globalisation better – data flows out of EU
– Improve harmonisation within EU (binding interpretation by Art
29 WP?)
– Strengthen Data Subject’s rights/ enhancing control over PD eg,
online subject access, clarifying definitions of consent
– Reduce red tape for Data Controllers – multinationals only to be
regulated by 1 EC DPA - saving 2.3 billion Euros for EU industry -
quid pro quo?
– Make DCs more accountable, eg, must have a CPO; audit trails of
processing; “privacy by design” (?)
– Clarify rules on jurisdiction, applicable law and DP (eg Facebook?
Google?)
10. Fiddling round the edges while privacy
burns?
OECD Privacy Principles, 1980 / “FIPs”/”notice and
choice”
• Collection Limitation Principle
• Data Quality Principle
• Purpose Specification Principle
• Use Limitation Principle
• Security Safeguards Principle
• Openness Principle
• Individual Participation Principle
• Accountability Principle
11. Data Protection Principles (DPD, art 6)
1. Personal Data shall be processed lawfully and fairly (“collection
limitation”).
2. Personal Data shall be obtained only for one or more specified
and lawful purposes, and shall not be further processed in a
manner incompatible with those purposes (“purpose /use
limitation”).
3. Personal data shall be adequate, relevant and not excessive in
relation to the purpose for which it was processed (add “data
minimisation” principle? – DP Reg)
4. Personal data shall be accurate and kept to date if necessary
(“data quality”).
5. Personal data shall not be kept for a longer time than it is
necessary for its purpose. (“retention”)
6. Personal data can only be processed in accordance with the rights
of the data subjects (“openness”)
7. Appropriate technical and organisational measures shall be taken
against unauthorised or unlawful processing (“security”).
8. Data export principle (and DP Reg may add “accountability”)
12. Fundamental challenges not
addressed?
A. Decline of real and informed consent
online
B. Ubiquitous computing/ambient
intelligence/the Internet of Things
C. Big Data and profiling
• In each case fundamental elements of
the “notice and choice” paradigm are
elided or destroyed
13. A. Consent
• Existing DPD: Art 7 – grounds for fair processing
(1st DP principle)
– Consent of Data subject.
– Necessary to perform contract DS is party to or for DS to
enter a contract.
– Necessary to comply with a legal obligation of the data
controller.
– Necessary to protect DS’s “vital interests”.
– Processing is necessary for judicial purposes, public acts or
acts of crown.
– Necessary for “legitimate interests” of DC unless contrary
to human rights of DS.
14. Consent as it’s meant to be
• DPD , Art 2 “any freely given, specific and
informed indication of his wishes by which the
data subject signifies his agreement to personal
data relating to him being processed.”
• Art 7 as ground for fair
processing, “unambiguous”
• Art 8(2)(a) as ground for processing of sensitive
PD, “explicit”
• Freely given? Standard terms? Employees?
Consumers? Social Networks?
• Art 29 WP reports questioned quality of consent
in privacy policies and some relationships esp
employment surveillance (social media
passwords?).
15. Consent online in real life
• Privacy policies largely unreadable by non lawyers
• Users prize immediate gains (social inclusion )over future
dangers (data leakage, employers, NSA etc) -> faulty risk
assessment
• Constant change of T& C and defaults requires continuing
vigilance and skill by users
• Lock-in network effect –=> non competitive market on user
rights (social death not to be on Facebook, who knows about
Duck Duck Go?)
• -> Market failure in respect of privacy on SNSs – so why
bother checking privacy policies anybody?
• SNS economic incentives are to encourage disclosure not
encourage privacy (changing?) (but even mentioning privacy
reduces revenues - Bonneau)
19. Consent: DP Reg Solution?
• Change of definition to “freely given, specific, informed and
explicit” – meaning “based either on a statement or on a clear
affirmative action” (new recital 24) – but does this make any
difference in online standard form consumer contracts?
• Consent doesn’t count where there is a “significant imbalance”
between Data Subject and Data Controller (eg employee)
• But
• Largely no restrictions on what can be consented to – no attempt at
a consumer protection/unfair terms regime approach re unread
adhesion contracts – “regulated contracts”
• No restrictions on use of “legitimate business purposes” as
alternative to consent for legalising processing (and one report
suggests this should enable incompatible uses with original grant of
consent)
• Conclusion – not much help?
21. Example: Location data
• Richard Stallman, March 2011
• “It's Stalin's dream. Cell phones are tools of Big Brother.
I'm not going to carry a tracking device that records
where I go all the time, and I'm not going to carry a
surveillance device that can be turned on to
eavesdrop.“
• Art 29 WP 13/2011
• Some attempt to provide enforceable rights to “turn
off” location data collection in PECD – how effective?
Eg recent UK EE subscriber location data sales by Ipsos
Mori to Met Police (anonymised?)
23. Barcelona clubbers get chipped
(2004)
BBC Science producer Simon Morton
goes clubbing in Barcelona with a
microchip implanted in his arm to
pay for drinks.
Imagine having a glass capsule
measuring 1.3mm by 1mm, about the size
of a large grain of rice injected under
your skin.
Last week I headed for the bright lights of
the Catalan city of Barcelona to enter the
exclusive VIP Baja Beach Club.
The night club offers its VIP clients the
opportunity to have a syringe-injected
microchip implanted in their upper arms
that not only gives them special access to
VIP lounges, but also acts as a debit
account from which they can pay for
drinks.
Data collection from the
body/biometrics
Kevin
Warwick,
University
of Reading
25. London advertisement targets
consumers by gender, with facial
recognition, Feb 20 2012
- Plan UK (charity)
Non volunteered data?
Cas “Ubiquitous Computing, Privacy and DP”, 2009: “Biometric
procedures replace the need to remember passwords or actively
prove authorisation.. [ambient intelligence environments] require
previously inconceivable levels of knowledge about the inhabitants”
Chinese face recognition
enabled door – on sale,
26. The future of ambient environments
and the death of notice and choice?
• Ubiquity = “invisible and seamlessly adaptive” (Spiekerman and Pallas) - always
on, always collecting data
• Weiser – ICTs weaving themselves “into the fabric of everyday life until they are
indistinguishable from it”
• The more useful, the less obvious and the less controlled by individual notice and
choice.
• Adaptive – learn from ambient total data collection, data not forgotten otherwise
usefulness constrained– eg domestic or hospital care robots
• How can this match DP idea of privacy as individual right to control collection of
data? Notions of data minimisation in collection, limitation of purpose and use?
• Note that ambient environments also often collect data about those most vulnerable
and unable to exercise control – young, sick, geriatric, Alzheimers (eg the iPot, smart
chairs, robots, geo-tagged schools and libraries)
• Cas “ubiquitous computing will erode all central pillars of current privacy protection”
• Resistance?
– Default off – but what happens to social gain?
– Controls on use rather than collection – how to enforce? (anonymisation – see later)
– “Negotiation”? Eg wearing hoodies round CCTV; injecting false info (“noise”) into social networks
etc – what is equivalent for ubicomp?
– Privacy impact assessments prior to building systems plus privacy by design? Spiekerman’s RFID
experience.
27. Big Data
What is Big Data?
• “about applying maths to huge amounts
of data to infer probabilities.. The key is
these systems perform well because they
are fed with lots of data on which to base
their predictions”
– Eg Google Flu Trends – most common 50 m
search query terms analysed
• “big data refers to things one can do at a
large scale that cannot be done at a small
one”
• “in a Big Data age , most innovative
secondary uses haven’t been imagined
when the data is first collected”
– Eg Captcha - > ReCaptcha
• Internet industries produce these huge
amounts of data : Google, 24
Petabytes/day; FB, 10m photos uploaded
/hr; 400 m tweets/day (2012)
• “there is a treasure hunt underway” *(p
15)
28. Effect on DP/FIPs?
• “How can companies provide notice for a purpose that has yet to
exist? How can individuals give informed consent to an unknown?”
(p 153)
• Seeking new consent for each re use at big data scale seems
impossible
• Seeking blanket consents for any re use destroys whole point of
consent as effective control
– Yet heading this way?: eg Google combining all its privacy consents
(policies) to mail, video, search, blogging etc , Jan 24 2012
• Anonymisation of data collected? Common excuse. Yet re-
identification ever easier esp with big data recombined - see Ohm
“Broken Promises”(2010) – AOL, Netflix scandals.
– Eg anonymise FB data and reidentification from friends, and friemds of
friends – “social graph” – often easy.
29. Solutions?
• Ohm “Utility and privacy are, at bottom, two goals at war with one
another” (p 1752)
• M-S and Cukier: “From privacy to accountability” – abandon
dependency on individual consent at time of collection & hold data
users (controllers) accountable (p 173)
– Means what?
– Risk assessment by users of whether data products should be
issued? External/internal audit by “algorithmists”?
– Prior privacy impact assessments for “risky” processing?
– Privacy by design – eg “differential privacy”, fuzzing some
results?
– Justified by benefits of big data to users - Paternalistic trust?
• What would legal liability be for getting it wrong? Strict liability?
Causation? Slamming door after horse has bolted?
• My own “thought experiment” on “privacy tax” on data users,
2004, “The Problem with Privacy” (SSRN)
Editor's Notes
Another way to look at it is to consider what data Facebook discloses by default when you sign up. In other words, if you create a profile or do things on the site, how much of it is public before you the user do anything? Again this keeeps changing. TAnother useful graphic from a private user called Matt McKeon using data gathered by US digital rights org the EFF produced some very useful graphics tracking how much data the PP demanded the user to disclose as the policy canaged from 2005 through to 2010. He has it for every year but ‘ll just shopw you 2005 and 2010..
In December 2009 FB changed the defaults the sites so that much data that was once by default private now became public – even some one to one chats between users, eg – and some data was shared automatically with other websites when users visited them. This is why some of the people on OpenBook are saying things they probably never expected anyone except thjeir friends to read – they don’t realise the terms of using the site have changed and now some of their very personal data is public.Protecting your privacy now on FB – ie changing the default settings , and keeping on top of new changes - is complicated enough that people are writing software to do it for you – tools liike ReclaimYourPrivacy.Org & SaveFace..-> Can it really be this difficult you ask?? see NYT times graphic.
Defaults? Spotify to FB – Fitbit sharing sexual activity
Big successesGoogle Flu Trends – predicted in real time where ful epidemic likely to be at its worst from search terms entered (G didn’t pick them , just used figures from gov to correlate w prior outbreaks and “learnt” the 45 search terms most correlatedDrugs – from existing abstracts of all existing chemical compounds -> new ones eg