Latest ICO News
- Information Commissioner reminds political parties they must comply with the law ahead of General ElectionThe Information Commissioner has sent the following letter to the political parties in relation to the use of data in political campaigning
- As far back as Sir Robert Peel, the powers of the police have always been seen as dependent on public support of their actions. It’s an ideal starting point as we consider uses of technology like live facial recognition (LFR).
- In 2017 the Information Commissioner's Office ("ICO") commenced a formal investigation into the misuse of personal data in political campaigns.
- As the initial Call for Input into the development of the ICO AI Auditing Framework comes to an end, Simon McDougall, Executive Director for Technology and Innovation, reflects on some of the overarching themes that have emerged in the first phase of our work.
- A blog by Ian Hulme, Director for Regulatory Assurance.
Latest ISO News
- With more than 16 billion injections administered around the world every year, devices for administering medication into the human body are big business. The ISO committee of experts that develops standards …
- Economic and trade uncertainty, changing societal expectations, the impacts of climate change, and digital transformation were the main disruptive forces highlighted at ISO’s General Assembly that will …
- Almost three billion people rely on traditional cookstoves and open fires for cooking and heating, placing them at serious risk of health disorders and premature death. The latest in ISO’s series of standards …
- The participation of developing countries was highlighted as key in ensuring ISO can continue to deliver solutions into the future, at today’s meeting in Cape Town, South Africa, as part of the ISO Week …
- International standards can bring about a harmonization that promotes strength for countries in all areas of their development. It enables them to act cohesively instead of separately, gain a firmer foothold …
Latest Dark Reading News
- Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.
- The acquisition was confirmed just six months after Carbonite bought Webroot.
- Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers' methods.
- A new analysis advises security teams on what they should know about the underground payment card seller.
- Master new exploit techniques for Microsoft RDP, Java remote protocols at Black Hat Europe in London next month.