![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Nha they publish metadata describing the leaked data. If you’re a data subject concerned by the incident you then request a copy of yr information which requires proper identification.
Why would they share the data itself….
Nha they publish metadata describing the leaked data. If you’re a data subject concerned by the incident you then request a copy of yr information which requires proper identification.
Why would they share the data itself….
Would you happen to have one to recommend to switch from Spotify to apple music? I’m thinking about moving but my playlists are keeping me from leaving.
I discovered the vinegar as a condiment with vinegar salt potato chips. Then I found out the fries. Sooooo good.
Ho yeah that reminds me of spicy honey on cheesy pizzas… maybe my best memory from l.a.
And those preventive measures as well indeed - on top of those cameras because some assholes don’t learn unless they get hit in the bank.
Until everyone behaves within acceptable societal standards traffic / red light cams are a reasonable part of the strategy to steer assholes towards the goal. As much as awareness campaigns, improving training, lowering vehicle velocity when it sees yellow automagically maybe…
Which doesn’t mean there aren’t unfortunate abuses by cops or city wrt shortening yellow duration to pocket more cash or such like.
And I strongly believe that cops should be doing more interesting cop stuff then enforcing traffic tickets in our days and age.
At this point they are somewhat catching up on what traditional banks are doing it seems…
Typically llm are rather ressource intensive - you need beefy hardware to run those at speed. Especially if you intend to train them with your data to improve their relevance. I don’t think mobile phones or run to the mill laptops are going to be enough for any non-trivial implementations. I might be skewed by experiences on non-personal projects though.
How do you anonymise without supervision ? And obfuscation isn’t anonymisation…
They could try to pass it as a legitimate interest but likely it would be struck as being ultimately disfavouring the individual and favouring the business. Probably.
Well then explain me how you propose to apply data subject rights to a llm… you can’t currently un-train those as far as I know. And that’s not touching IP which isn’t exactly the same here and there.
I’m professionally watching what’s happening with this very topic and the current state of the law and related decisions makes everyone in the business cautious at the very least. Doesn’t prevent business to take risks but it’s risk taking indeed.
Yeah that’s not standing in europe… especially for PII…
I can relate to the guy that had to put that number in. Prolly went along the lines of « can we get some budget to identify our various processing activities and what processors are involved ? »… to what management said « lol no just put the overall numbers in ». And the guy included the kitchen company in there because fuck it.
Due to restrictions from the city we had to do interior :-/ So we also re-did the electrical wiring and the heating as we were anyway redoing most of the walls.
The exteriors went through a lot with the heavy machinery that we had to rent for some of the work and I’m looking into how to best save it. It was definitely better looking 2 years ago …
I’m trying to finish our home remodel. Currently I’m on adjusting the windows as we added 20cm of insulation;
I hope so… we need more discussing to help everyone find what they can do and that requires more listening and less shouting indeed.
I’m convinced that we can address needs for changes while not being doomsday cultists either; I’m pretty much doing it as much as I can while not being a drama queen about it and generally shutting the fuck up.
But it doesn’t get me much attention which I guess is what the cultists are after.
Compared to the peaceful nations of China, Iran and Russia?
I haven’t mentioned IT security at all have I?
A lot of businesses (including my current employer) seem to enjoy the integrated ecosystem offered by ms from the office suite to sharepoints to mail indeed with a sprinkle of power bi and the form thingy.
You can replicate all that but it is absolutely not trivial. And the end user also typically will find it less easy to interact with all the pieces.
They are active in whistleblowing, not privacy leak management…