Salinger Privacy published an overview of the protocols companies should follow when considering participation in a data "hackathon” to solve privacy issues. In such a hackathon, or “datathon,” data scientists and other employees use data from sponsors or public entities “to quickly generate insights and build potential solutions” for a specific problem. Organizations offering data sets for hackathons should consider whether use of the data is allowable in the first place, other obligations for the collection and storage of the data set, whether deidentified data can still be considered personal information under the applicable law and what data security measures are needed.
Overview of data protection protocols for hackathons published
Related stories
Luminos.AI, ZwillGen partner on AI law platform to help scale common governance practices
Notes from the IAPP Canada: Are good intentions enough to stay on top of potential data breaches?
A view from DC: Can consumer protection enforcement unduly burden AI innovation?
CPPA Board finalizes long-awaited ADMT, cyber audit, risk assessment rules
A view from Brussels: Will the Data Union Strategy finally lead to the European data single market?