Does your company have the same policies and procedures?
http://fourthamendment.com/?p=45721
D.Mass.: Def had no REP in his employer’s information he was accused of taking
Defendant is charged with accessing and taking his employer’s information for the purpose of setting up a rival company doing the same thing. His motion to suppress the information is denied because he has no reasonable expectation of privacy in it. United States v. Yu, 2020 U.S. Dist. LEXIS 187575 (D. Mass. Oct. 9, 2020):
Yu had no reasonable expectation of privacy in the data searched. This is for two reasons. First, he had no right to privacy in the actual information ADI reviewed, which consisted of only the names and access-times of various files. ECF No. 67 at 5. This information belonged to ADI, not Yu. These logs collected recordings of his ADI-owned computer’s access to ADI-owned documents and could not sweep in the contents of his personal information. Cf. O’Connor v. Ortega, 480 U.S. 709, 718 (1987) (holding a public employee had a reasonable expectation of privacy in the contents of his personal desk and filing cabinet). Second, ADI had in place a “Technology Resource Policy” that warned employees that they “should have no expectation of privacy” and that ADI could “search, monitor, inspect, review, access and/or disclose” all data on its technology platforms. ECF No. 67-1 at ADI-YU-0000162, 165. These type of policies constitute strong evidence that employees lack a reasonable expectation of privacy in the covered activities.
A new resource.
https://www.springer.com/journal/43681
AI and Ethics
AI and Ethics seeks to promote informed debate and discussion of the ethical, regulatory, and policy implications that arise from the development of AI. It will focus on how AI techniques, tools, and technologies are developing, including consideration of where these developments may lead in the future. The journal will provide opportunities for academics, scientists, practitioners, policy makers, and the public to consider how AI might affect our lives in the future, and what implications, benefits, and risks might emerge. Attention will be given to the potential intentional and unintentional misuses of the research and technology presented in articles we publish. Examples of harmful consequences include weaponization, bias in face recognition systems, and discrimination and unfairness with respect to race and gender.
For my geeks.
The unreasonable effectiveness of the Julia programming language
Fortran has ruled scientific computing, but Julia emerged for large-scale numerical work.
No comments:
Post a Comment