Blog
Filters
68 results
-
Artificial Intelligence: accuracy principle in the processing activity
The performance of an algorithm, among others artificial intelligence algorithms, could be compromised by the inaccuracy of the input data when running it, not only by the data used for development. Therefore, in the assessment of a processing activity that embeds an AI system, it is needed to...
Read more
-
Federated Learning: Artificial Intelligence without compromising privacy
Privacy Enhancing Technologies (PET) enable data sharing by ensuring data protection principles and will also build trust between different actors when sharing data. Federated Learning techniques are a category of PET that allow the development of machine learning systems without the need to...
Read more
-
AI: System vs Processing, Means vs Purposes
An AI system, or several AI systems, could be means selected by a controller to implement personal data operations of a processing activity. It is key to understand that the final purpose of a processing activity is different from the means selected and performed to implement such processing. Indeed...
Read more
-
UEBA and data protection
In recent years, the use of techniques called “User and Entity Behavior Analytics” (UEBA) has spread wide over. These types of techniques have a multitude of applications that always have something in common: record the behavior of users in the past, model this behavior in the present and, if...
Read more
-
Anonymization III: The risk of re-identification
The anonymization is a processing that requires the application of the proactive responsibility principles. This means that the controller must ensure, with a formal analysis, that the anonymized data set is not re-identifiable. However, it must be assumed that there could be a residual probability...
Read more
-
When to review data protection measures
The measures that guarantee and demonstrate that a processing is in conformity with data protection regulations must be reviewed and updated in the event of any change in the nature, scope, context, purposes of the processing or any change in the risks to the rights and freedoms of natural persons...
Read more
-
Neurodata: privacy and protection of personal data (II)
Brain-computer interfaces make possible to record the activity generated by the brain. This activity depends on internal and external factors to the individual, which act on a certain genetic basis. These technologies allow the collection of neurodata which, as they are associated with identified or...
Read more
-
Neurodata and neurotechnology: privacy and protection of personal data
Recent advances in neuro-technology and artificial intelligence are enabling the emergence of a growing number of connected devices that monitor brain activity for different purposes.
Read more
-
Metaverse and Privacy
Metaverses aim to extend the social networking experience far beyond the visual aspect or 3D graphics. The metaverse engages the user in multiple dimensions, such as social, economic, political or emotional, to the point of virtualizing all aspects of the development of an individual, and extends...
Read more