Home Tags Personal data

personal data Related Content

development of facial recognition, IBM

Tech companies drop development of facial recognition

Some tech companies have dropped development of facial recognition software, under fears of human rights violations by police.
videoconferencing

Videoconferencing with security in mind

Gerald Beuchelt, Chief Information Security Officer at LogMeIn, explores the key security and privacy practices which must be upheld when video conferencing.
Fax machines

Fax machines must be eradicated across the public sector

Scott Wilson, director of service at eFax, explains why fax machines are still being widely used, the problems it causes and how they can be eradicated from both public and private sector organisations.
isolationist world, data privacy

Data privacy in an isolationist world

As political and security landscapes evolve, the way data privacy is upheld will change significantly. Here, Rachel Roumeliotis, Strategic Content Director at O’Reilly, explores how organisations can stay protected in an isolationist world.
AML defences

Coronavirus should not be a pretext for lowering AML defences

John Dobson, chief executive, SmartSearch, declares that the coronavirus pandemic should not be justification for lowering AML defences.
Digitisation and Healthcare in the UK, fujitsu

Digitisation and Healthcare in the UK

Here, Fujitsu discuss the plan for changing current situation of digitisation and healthcare in the UK.
ethics of AI development, public policy

The ethics of AI development in public policy

Dr Emma Carmel illustrates the paradoxical realities of ethics in AI development, with recommendations for forming an effective public policy.
personal cybersecurity, signal

European Commission: Personal cybersecurity via encrypted messaging

Signal is the messaging app that claims the highest level of personal cybersecurity: Why has the European Commission chosen this over other platforms?
healthcare security

Overcoming the complexities of healthcare security

Matt Walmsley, EMEA Director at Vectra, discusses how security teams within the healthcare industry lack visibility into and control over medical devices connected to the network.
what we read online, cambridge analytica

Our actions decide what we read online, algorithms are only a part of it

In light of scandals like Cambridge Analytica, Tor Richardson Golinski, Amelia Harshfield and Advait Deshpande dissect the truths of who decides what we read online.
access rights

Protecting patient data through stringent access rights management

Sascha Giese, Head Geek at SolarWinds, looks at the importance of managing access rights in healthcare organisations, highlighting four steps to help illustrate how IT teams can integrate this successfully into every department.
Cyber security in the public sector

Keeping hackers out and costs low: Cyber security in the public sector

Kieran O’Driscoll, Public Sector Business Lead at CyberArk discusses the challenges faced by public sector firms when it comes to balancing cost-effective cyber security with the need to secure the personal details of millions of UK citizens.
urban connected spaces, smart cities

Smart cities, smarter approaches: How to build trust into connected urban spaces?

Here, Ashley Stevenson explains to us how smart cities need to build trust into connected urban spaces.
personal information

The Lancaster University data breach: Safeguarding students personal information

Organisations like universities that handle significant amounts of confidential and personal information are increasingly being targeted by cyber criminals. In this article SecureTeam looks at the damage data breaches are causing in UK universities.
civil service email leaks

Why trust at face value can’t fix the civil service email leaks

Matt Radolec, Security Architect Manager at Varonis, discusses the issues around unlimited access to email, the importance of appropriate levels of protection and what needs to change to prevent further government leaks of this nature, here.
cybersecurity in hospitals, hospitals and care centres

Cybersecurity in hospitals and care centres

Dr Peter Leitner and Stela Shiroka, at INTERSPREAD GmbH, detail cybersecurity in hospitals and care centres and their thoughts on the need for increased awareness and enhanced training capabilities in Europe.
demystify data

5 steps to demystify data in Defence

Vanessa Fernandes highlights five tips on how to demystify data and get yourself closer to the benefits it can bring, here.
own data

The future of public services means giving citizens control over their own data

Patrick Stephenson, Client Managing Director: Central and Regional Government at Fujitsu in the UK and Ireland, discusses why governments need to give citizens control over their own data.
mobile industry

How have security threats revamped the mobile industry?

Tech geek Devin Smith highlights how the mobile industry has been revamped to counter security threats posed by cyber crime in this article.
voice biometric technology

How voice biometric technology is transforming modern contact centres

Tim Dunn, Commercial Director at ValidSoft discusses the benefits of deploying voice biometric technology and how it can transform modern call centres.

Follow Open Access Government