A woman who has been protesting a pipeline says that Melbourne Water will publically apologise to her for collecting her personal information, ABC News reports. The woman said, "It has now set a precedent that you cannot treat people in that fashion...Even if you're a large government agency, you must abide by the law. You cannot do those things."
Full Story
shareShare This
Related Stories
IAF looks to the privacy industry's future
In a blog post, Information Accountability Foundation Chief Strategy Officer Elizabeth Denham talks about the future of the privacy industry as it faces new challenges. She encouraged readers to broaden their assessments, study new artificial intelligence law requirements and think creatively about ...
Apple expected to launch iOS 18 with AI functions
Apple is expected to launch its iPhone iOS 18 update with artificial intelligence functions that do not use cloud processing technology, Forbes reports. ESET Global Cybersecurity Advisor Jake Moore said having the technology within the device could mean users "have more comfort in the knowledge that...
Companies begin rolling out chief AI officer appointments
Major companies are creating chief artificial intelligence officer positions to oversee the responsible use and integration of the technology, the Financial Times reports. Responsibilities CAIOs are being tasked with include facilitating the deployment of both generative AI systems and other AI tech...
Notes from the Asia-Pacific region, 12 April 2024
Kia ora koutou,
Back in August 2023, I wrote about the release of a consultation paper on the regulation of biometrics by New Zealand's Office of the Privacy Commissioner. In the paper, the OPC indicated its intention to issue a code of practice regulating the use of biometric technologies. In the ...
PCPD releases report on Cyberport cyberattack
Hong Kong's Office of the Privacy Commissioner for Personal Data released its investigative report on a cyberattack on Cyberport that affected 13,000 people. The PCPD said Cyberport "failed to implement sufficient and effective measures to ensure the security of its information systems prior to the ...
Comments
If you want to comment on this post, you need to login.