Blog

Filters

Sectorial

Results will be updated when selecting an option from the filters

Tags

Results will be updated when selecting an option from the filters

RSS

68 results

  • mikado

    Artificial Intelligence: accuracy principle in the processing activity

    The performance of an algorithm, among others artificial intelligence algorithms, could be compromised by the inaccuracy of the input data when running it, not only by the data used for development. Therefore, in the assessment of a processing activity that embeds an AI system, it is needed to...

    Read more

  • Entrenamiento federado

    Federated Learning: Artificial Intelligence without compromising privacy

    Privacy Enhancing Technologies (PET) enable data sharing by ensuring data protection principles and will also build trust between different actors when sharing data.   Federated Learning techniques are a category of PET that allow the development of machine learning systems without the need to...

    Read more

  • Blog

    AI: System vs Processing, Means vs Purposes

    An AI system, or several AI systems, could be means selected by a controller to implement personal data operations of a processing activity. It is key to understand that the final purpose of a processing activity is different from the means selected and performed to implement such processing. Indeed...

    Read more

  • luke-chesser-JKUTrJ4vK00-unsplash

    UEBA and data protection

    In recent years, the use of techniques called “User and Entity Behavior Analytics” (UEBA) has spread wide over. These types of techniques have a multitude of applications that always have something in common: record the behavior of users in the past, model this behavior in the present and, if...

    Read more

  • chris-yang-1tns-BVy9Jk-unsplash

    Anonymization III: The risk of re-identification

    The anonymization is a processing that requires the application of the proactive responsibility principles. This means that the controller must ensure, with a formal analysis, that the anonymized data set is not re-identifiable. However, it must be assumed that there could be a residual probability...

    Read more

  • Foto de Philipp Katzenberger en Unsplash

    When to review data protection measures

    The measures that guarantee and demonstrate that a processing is in conformity with data protection regulations must be reviewed and updated in the event of any change in the nature, scope, context, purposes of the processing or any change in the risks to the rights and freedoms of natural persons...

    Read more

  • deepmind-LaKwLAmcnBc-unsplash

    Neurodata: privacy and protection of personal data (II)

    Brain-computer interfaces make possible to record the activity generated by the brain. This activity depends on internal and external factors to the individual, which act on a certain genetic basis. These technologies allow the collection of neurodata which, as they are associated with identified or...

    Read more

  • machine-learning

    Neurodata and neurotechnology: privacy and protection of personal data

    Recent advances in neuro-technology and artificial intelligence are enabling the emergence of a growing number of connected devices that monitor brain activity for different purposes. 

    Read more

  • Foto de julien Tromeur en Unsplash

    Metaverse and Privacy

    Metaverses aim to extend the social networking experience far beyond the visual aspect or 3D graphics. The metaverse engages the user in multiple dimensions, such as social, economic, political or emotional, to the point of virtualizing all aspects of the development of an individual, and extends...

    Read more