Tuesday, November 22, 2022

It is. But it’s how that data is (mis)used that is important.

https://www.pogowasright.org/is-everything-sensitive-data/

Is Everything Sensitive Data?

Odia Kagan of Fox Rothschild writes:

After the recent Court of Justice of the European Union decision on sensitive inferences that can be drawn from the name of your spouse, it is fair to ask: Is everything sensitive data (special category data)?
Katie Hewson of Stephenson Harwood and I were duly skeptical earlier this month at the 7th annual INPLP Annual Conference in Vienna, Austria.
But…
  • It IS a CJEU decision
  • The definition of sensitive information under the new US privacy laws is Article 9 GDPR, plus more
  • Sensitive inferences are a point of focus for the Federal Trade Commission and at issue in the new FTC Kochava case
  • Sensitive inferences take on a new significance in the wake of the Dobbs decision
  • Inferences are personal information and should be included in your response to CA access requests, along with, according to the California Attorney general, a detailed explanation of how the inferences were made (algorithmic transparency)…..

Read more of this post at Privacy Compliance & Data Security





How much funding/training/support is required before the hackers become an instrument of the state? If they attack the US, are we at war?

https://www.cyberscoop.com/china-hacking-talent-xi-jinping-education-policies/

How Xi Jinping leveled-up China's hacking teams

From the early 2000s to 2015, China’s hacking teams caused havoc for private companies and U.S. and allied governments. In a series of high-profile breaches, they poached government databases, weapon system designs and corporate IP. From the breach of the Office of Personnel Management, to Marriott, to Equifax, to many, many others, the People’s Republic of China’s digital warriors demonstrated the full potential digitally mediated espionage.

But if Chinese President Xi Jinping has his way, this litany of breaches represents only the beginning of China’s digital prowess.

A year after coming to power in 2013, Xi began to prioritize cybersecurity as a matter of government policy, focusing the bureaucracy, universities and the security services on purposefully cultivating talent and funding cybersecurity research. During his time in office, the Chinese state has systematized cybersecurity education, improved students’ access to hands-on practice, promoted hacking competitions, and collected vulnerabilities to be used in network operations against China’s adversaries.





A logical next step.

https://arstechnica.com/information-technology/2022/11/nvidias-magic3d-creates-3d-models-from-written-descriptions-thanks-to-ai/

3D for everyone? Nvidia’s Magic3D can generate 3D models from text



No comments: