Tag: regulatory

  • The Register: Worker surveillance must comply with credit reporting rules

    Source URL: https://www.theregister.com/2024/10/26/worker_surveillance_credit_reporting_privacy_requirement/ Source: The Register Title: Worker surveillance must comply with credit reporting rules Feedly Summary: US Consumer Financial Protection Bureau demands transparency, accountability from sellers of employee metrics The US Consumer Financial Protection Bureau on Thursday published guidance advising businesses that third-party reports about workers must comply with the consent and transparency requirements…

  • Slashdot: US Consumer Watchdog Cautions Businesses on Surveillance of Workers

    Source URL: https://yro.slashdot.org/story/24/10/25/1749218/us-consumer-watchdog-cautions-businesses-on-surveillance-of-workers?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: US Consumer Watchdog Cautions Businesses on Surveillance of Workers Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the recent guidance issued by the U.S. Consumer Financial Protection Bureau (CFPB) regarding the use of artificial intelligence and algorithmic tools for employee monitoring. It highlights potential legal issues…

  • Hacker News: Geico repatriates work from the cloud, continues ambitious infra overhaul

    Source URL: https://www.thestack.technology/warren-buffetts-geico-repatriates-work-from-the-cloud-continues-ambitious-infrastructure-overhaul/ Source: Hacker News Title: Geico repatriates work from the cloud, continues ambitious infra overhaul Feedly Summary: Comments AI Summary and Description: Yes Summary: This text discusses GEICO’s decision to repatriate workloads from the cloud after experiencing increased costs and decreased reliability. The article highlights the challenges faced during their initial cloud migration…

  • The Register: The open secret of open washing – why companies pretend to be open source

    Source URL: https://www.theregister.com/2024/10/25/opinion_open_washing/ Source: The Register Title: The open secret of open washing – why companies pretend to be open source Feedly Summary: Allowing pretenders to co-opt the term is bad for everyone Opinion If you believe Mark Zuckerberg, Meta’s AI large language model (LLM) Llama 3 is open source.… AI Summary and Description: Yes…

  • Hacker News: Polish radio station ditches DJs, journalists for AI-generated college kids

    Source URL: https://www.theregister.com/2024/10/25/polish_radio_station_ai_hosts/ Source: Hacker News Title: Polish radio station ditches DJs, journalists for AI-generated college kids Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the decision by Polish radio station OFF Radio Krakow to replace human on-air talent with AI hosts as part of an experiment. This move raises significant…

  • The Register: ‘Consent’ LinkedIn used for data processing was not freely given, says Ireland

    Source URL: https://www.theregister.com/2024/10/25/consent_linkedin_dopc_fine/ Source: The Register Title: ‘Consent’ LinkedIn used for data processing was not freely given, says Ireland Feedly Summary: Microsoft-owned social media for suits site gets €310M fine, told to get compliant When LinkedIn asked its European users for their personal data, it did not receive “informed" nor "freely given" consent for the…

  • CSA: How CSA Research Uses the Cloud Controls Matrix

    Source URL: https://cloudsecurityalliance.org/blog/2024/10/25/how-csa-research-uses-the-cloud-controls-matrix-to-address-diverse-security-challenges Source: CSA Title: How CSA Research Uses the Cloud Controls Matrix Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the Cloud Security Alliance’s (CSA) utilization of the Cloud Controls Matrix (CCM) to enhance cloud security practices across various domains, including AI and quantum-safe security. It explores the development of…

  • Schneier on Security: Watermark for LLM-Generated Text

    Source URL: https://www.schneier.com/blog/archives/2024/10/watermark-for-llm-generated-text.html Source: Schneier on Security Title: Watermark for LLM-Generated Text Feedly Summary: Researchers at Google have developed a watermark for LLM-generated text. The basics are pretty obvious: the LLM chooses between tokens partly based on a cryptographic key, and someone with knowledge of the key can detect those choices. What makes this hard…

  • CSA: Cloud Security Best Practices from CISA & NSA

    Source URL: https://www.tenable.com/blog/cisa-and-nsa-cloud-security-best-practices-deep-dive Source: CSA Title: Cloud Security Best Practices from CISA & NSA Feedly Summary: AI Summary and Description: Yes Summary: Recent guidance on cloud security from CISA and NSA outlines five key best practices designed to enhance security in cloud environments, including identity and access management, key management practices, network segmentation, data security,…

  • The Register: European datacenter energy consumption set to triple by end of decade

    Source URL: https://www.theregister.com/2024/10/25/eu_dc_power/ Source: The Register Title: European datacenter energy consumption set to triple by end of decade Feedly Summary: McKinsey warns an additional 25GW of mostly green energy will be needed Datacenter power consumption across Europe could roughly triple by the end of the decade, driven by mass adoption of everyone’s favorite tech trend:…