article thumbnail

Infographic | Privacy enhancing technologies

Olartemoure Blog

Privacy-enhancing technologies are tools and techniques designed to protect users’ personal data and privacy by enabling the analysis and sharing of insights within data, without sharing the data itself. What are PETs? They minimize the use of data as they maximize its control. Why are they useful? They can take many forms.

Privacy 59
article thumbnail

Ensuring Data Privacy Compliance in AI Systems

Traverse Legal Blog

Data privacy and security have become critical concerns in the rapidly evolving landscape of artificial intelligence (AI). For AI tool developers and businesses using these tools, understanding and adhering to data protection laws like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) is essential.

Privacy 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

‘365 for Business’ Users’ Privacy Lawsuit Dismissed–Russo v. Microsoft

Technology & Marketing Law Blog

Instead, the allegations recount Microsoft’s numerous (robust) privacy-related representations made to customers. Claim under Washington’s CPA : The court says first that plaintiffs “overpayment theory” (that they would not have paid as much in price had they known of Microsoft’s lax privacy practices”) states a cognizable injury.

Privacy 107
article thumbnail

FTC Launches Anticipated Investigation of OpenAI Inc.

IP Intelligence

The frequency of these communications has only increased over the past few months as generative AI technology dominated headlines. Instead, enterprise users should be conducting their own due diligence on their specific usage and implementation of generative AI technology.

article thumbnail

Historic data protection ruling

Olartemoure Blog

Furthermore, it was alleged that the company did not obtain informed consent from users for the processing of their personal data, did not allow the suppression of the personal data collected, and did not observe the due diligence obligation in the safekeeping of personal data, which controllers are obliged to comply with.

article thumbnail

The Amendment to the IT Rules, 2021: Part 2 – Locked, Loaded, and Aimed at the Intermediaries

SpicyIP

This two-part series looks at and analyses the proposed draft amendment (“Draft Amendment”) to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (“IT Rules, 2021”). For convenience, let’s recap what these proposed amendments are: 1. This is a proposed addition in the form of Rule 3(1)(m).

article thumbnail

The Amendment to the IT Rules, 2021: Part 1 – Locked, Loaded, and Aimed at the Intermediaries

SpicyIP

The Ministry of Electronics and Information Technology (“MEITY”), on 6 th June, 2022, issued a press release along with a proposed draft amendment (“Draft Amendment”) to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (“IT Rules, 2021”). v 1MG Technologies Pvt. Amit Kotak & Ors.