Authenteq is an automatic identity verification and privacy platform which enables users to verify their identity and create their own sovereign digital IDs which are stored encrypted in a blockchain. The funding for the Reykjavik, Iceland-based company was led by Draper Associates and Capital300.
The expedited move to shut down Google+ and its API in the wake of a second security issue puts a bit of a clock on auditors, investigators, and litigators looking to preserve ESI from the social media platform that could be relevant to future litigation.
Estonia has created one platform that supports electronic authentication and digital signatures to enable paperless communications across both the private and public sectors.
During this iteration of the TAR vs. Keyword Search Challenge held at the Education Hub at ILTACON 2018, TAR won across the board, as in previous iterations of the challenge.
Switching to blockchain could eliminate inefficient processes and unnecessary costs, but the digital transformation comes with risks.
Blockchain’s identification management processes, such as the ones that store and process personally identifiable information (PII), are crucial in designing GDPR-compliant solutions.
This is the FTC’s fourth case enforcing Privacy Shield. It continues the FTC’s commitment to enforcing international privacy frameworks, making a total of 47 cases enforcing the Privacy Shield, the predecessor Safe Harbor framework, and the Asia Pacific Economic Cooperation Cross Border Privacy Rules framework.
Different business stakeholders are often at odds with each other and matters are getting escalated to decision makers who had never been involved in the technically complex and largely misunderstood world of cookies.
With the signing of the California Consumer Privacy Act last week, privacy advocates and commentators are beginning to consider and comment on the potential result of this action.
The “open mic” of so many voice-assisted devices coupled with the nigh-ubiquitous network of “smart devices,” other gadgets and gizmos increasingly listening to everything said around them certainly presents opportunity for mistake – and, perhaps, hacking.