Remove Data collection Remove Risk Remove Surveillance Remove Technology
article thumbnail

On Surveillance in the Workplace

Schneier on Security

Touted as useful management tools, they can augment biased and discriminatory practices in workplace evaluations and segment workforces into risk categories based on patterns of behavior. Gamification and algorithmic management of work activities through continuous data collection.

article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude’s reply: Here’s a brief summary of the key themes and arguments made in security expert Bruce Schneier’s book Beyond Fear: Thinking Sensibly About Security in an Uncertain World : Central Themes: Effective security requires realistic risk assessment, not fear-driven responses. Focus only on proportional responses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

There is definitely a national security risk in buying computer infrastructure from a country you don't trust. Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. This is a complicated topic.

article thumbnail

Privacy issues in smart cities – Lessons learned from the Waterfront Toronto – Sidewalks project

Privacy and Cybersecurity Law

The experience made clear that no smart city can proceed without social license and that there is no social license without addressing privacy risks. Risk #1: Surveillance both from the State and surveillance capitalism. Digital solutions generally create the risk of law enforcement access to the data they collect.

article thumbnail

Microsoft to Add Dedicated AI Copilot Button on Windows PCs

SecureWorld News

Microsoft has said it is committed to making technology more accessible and user-friendly. Leading experts in AI and technology have expressed their views on this groundbreaking development. John Reynolds, a technology journalist, adds: "This move by Microsoft is a game-changer. What are the experts saying?

article thumbnail

PRIVACY ISSUES IN SMART CITIES – LESSSONS LEARNED FROM THE WATERFRONT TORONTO – SIDEWALKS PROJECT

Privacy and Cybersecurity Law

The experience made clear that no smart city can proceed without social license and that there is no social license without addressing privacy risks. . Risk #1: Surveillance both from the State and surveillance capitalism. Digital solutions generally create the risk of law enforcement access to the data they collect.

article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

This data can be used to gauge turnover risk, assess the need for new positions, and evaluate employee productivity and workplace engagement. UAM tools also greatly help ensure data security. Integration with a customer's existing infrastructure, including other security tools and various cloud technologies , is also crucial.