How creepy is that smart speaker, that fitness tracker, those wireless headphones? Mozilla created this guide to help you shop for safe, secure connected products.
a superb session with @simfin and my year 13s about online identity. Very engaging and thought provoking!!"
17 December 2024
10 December 2024
07 December 2024
How creepy is that smart speaker, that fitness tracker, those wireless headphones? Mozilla created this guide to help you shop for safe, secure connected products.
Electronic monitoring of home workers by companies is rising sharply, a survey suggests. The government is being urged to toughen the rules - and ban most webcam use.
"It was creepy," says Chris. "One of my managers was watching people's personal computers to monitor what we were doing at home - all the time, not just when we were working. It was a bizarre way to carry on."
What’s behind the rise of self-generated
indecent images of children online?
A report from the APPG (All Party Parliamentary Group) on social media
Facial recognition technology (FRT) may need to be regulated in much the same way as some ethically sensitive medical techniques to ensure there are sufficient safeguards in place to protect people's privacy and freedoms.
A sweeping set of regulations governing how online services should treat children’s data have been welcomed by campaigners as they come into effect.
The Age Appropriate Design Code – which was written into law as part of the 2018 Data Protection Act, which also implemented GDPR in the UK – mandates websites and apps from Thursday to take the “best interests” of their child users into account, or face fines of up to 4% of annual global turnover.
There is a clear summary of the code here
Now, with the Taliban back in power, each digital breadcrumb could be a reason to be punished or killed.
There are several different ways the Taliban could find out information about you: information stored locally on your device; your contacts (messages with whom you’ve exchanged may be on their devices); the cloud services you use; and the data moving between those places, subject to interception.
Comments
make a comment