![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Nha they publish metadata describing the leaked data. If you’re a data subject concerned by the incident you then request a copy of yr information which requires proper identification.
Why would they share the data itself….
Nha they publish metadata describing the leaked data. If you’re a data subject concerned by the incident you then request a copy of yr information which requires proper identification.
Why would they share the data itself….
This is literally how I’m getting my directors to stop pestering me about how complex my shit is. Dumbing it down and translating my messages for them. Works wonders.
At this point they are somewhat catching up on what traditional banks are doing it seems…
Typically llm are rather ressource intensive - you need beefy hardware to run those at speed. Especially if you intend to train them with your data to improve their relevance. I don’t think mobile phones or run to the mill laptops are going to be enough for any non-trivial implementations. I might be skewed by experiences on non-personal projects though.
Good luck fitting in society at that point… And avoiding all dependent technologies - cars, every city and shops that uses image recognition…. Plenty other ways to indirectly get anyone’s data in this world.
Now you can turn to the forest but is it better than the alternative ?
How do you anonymise without supervision ? And obfuscation isn’t anonymisation…
They could try to pass it as a legitimate interest but likely it would be struck as being ultimately disfavouring the individual and favouring the business. Probably.
Well then explain me how you propose to apply data subject rights to a llm… you can’t currently un-train those as far as I know. And that’s not touching IP which isn’t exactly the same here and there.
I’m professionally watching what’s happening with this very topic and the current state of the law and related decisions makes everyone in the business cautious at the very least. Doesn’t prevent business to take risks but it’s risk taking indeed.
Yeah that’s not standing in europe… especially for PII…
What I don’t get is what’s the end game? Because this will likely affect only already law abiding citizens or those with limited technical knowledge as bad agents will simply generate certificates and encrypt however they see fit. It’s not like building an encrypted client is hard…
Telco. Back then I was internal investigation. 25k employees. Bound to have some bad apples unfortunately. Honestly not weirder than elsewhere.
So do I but with exception of the unfortunate cp that calls for bleaching eyes (and security) one is more sanitary than the other…
I can relate to the guy that had to put that number in. Prolly went along the lines of « can we get some budget to identify our various processing activities and what processors are involved ? »… to what management said « lol no just put the overall numbers in ». And the guy included the kitchen company in there because fuck it.
I haven’t mentioned IT security at all have I?
A lot of businesses (including my current employer) seem to enjoy the integrated ecosystem offered by ms from the office suite to sharepoints to mail indeed with a sprinkle of power bi and the form thingy.
You can replicate all that but it is absolutely not trivial. And the end user also typically will find it less easy to interact with all the pieces.
« Perfectly possible » but at what cost and with what compromises though ? Not specifically looking at Microsoft - the same would apply to similar products. Also a lot of the blame is on the commission itself and the lack of controls over its data - which also has nothing to do with where it’s being processed. Even if you do 100% in EU with open source software you can still fail many of the controls if you don’t track your data, have appropriate documentation to demonstrate it, did the required assessments… and those expectations are what bit them in the ass I think. And likely it will bit a lot of other actors that aren’t putting much effort in the same.
There goes my week and prolly the whole year… I look forward the internal assessment at my job but chances are local authorities will follow on this and the implications are crazy. At first read it puts the bars sooooo high on several principles that basically no existing IT intensive business will have a chance to survive similar audit.
It’s absolutely not based on common law indeed but you can be sure that precedents are still a big thing especially for such regulations… we are watching like awks what’s happening everywhere because we know there will be a lot of consistency both on decisions but also on the topics being pursued.
As long as they process data of European citizens it’s applicable. See all gdpr fines imposed…. Now the execution / collection would be a bitch but I could imagine à order to stop processing the data imposed to European instances…
I mean pretty crazy things can happen. See the various adequacy decisions / appeals by Mr Schrems; I cannot give guidance with a life expectancy of more than 1 year given the instability of the application of the regulation.
Not that I’m complaining ; it feeds me :)
Yeaahhhh I don’t know about that… likely all instances are processors. And the on he subscribe to would be controller. Somewhat because to my knowledge no one really decides of particular treatment of the user data (it’s all rather communist architecturally). So maybe every instance would be join controller…
And in the end up to the (join) controller to cascade the request. That’s part of why it’s a thing of beauty to watch it happen on the feddiverse 😅
They are active in whistleblowing, not privacy leak management…