Tag: Violations
-
The Register: Oracle faces Texas-sized lawsuit over alleged cloud snafu and radio silence
Source URL: https://www.theregister.com/2025/04/02/oracle_breach_class_action/ Source: The Register Title: Oracle faces Texas-sized lawsuit over alleged cloud snafu and radio silence Feedly Summary: Victims expect to spend considerable time and money over privacy incident, lawyers argue Specialist class action lawyers have launched proceedings against Oracle in Texas over two alleged data breaches.… AI Summary and Description: Yes Summary:…
-
Wired: Democratic Senators Call for Privacy Act Reform in Response to DOGE Takeover
Source URL: https://www.wired.com/story/democratic-senators-privacy-act-reform-doge-takeover/ Source: Wired Title: Democratic Senators Call for Privacy Act Reform in Response to DOGE Takeover Feedly Summary: The Privacy Act Modernization Act would update 1974 legislation for the modern age, restricting government use of personal data and introducing new penalties, including prison time, for violators. AI Summary and Description: Yes Summary: The…
-
AlgorithmWatch: Algorithmic Policing: When Predicting Means Presuming Guilty
Source URL: https://algorithmwatch.org/en/algorithmic-policing-explained/ Source: AlgorithmWatch Title: Algorithmic Policing: When Predicting Means Presuming Guilty Feedly Summary: Algorithmic policing refers to practices with which it is allegedly possible to “predict” future crimes and detect future perpetrators by using algorithms and historic crime data. We explain why such practices are often discriminatory, do not hold up to what…
-
CSA: How Does Continuous Controls Monitoring Improve GRC?
Source URL: https://cloudsecurityalliance.org/articles/how-to-transform-your-grc-with-continuous-controls-monitoring Source: CSA Title: How Does Continuous Controls Monitoring Improve GRC? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Continuous Controls Monitoring (CCM) as a crucial approach for organizations to enhance their compliance management and risk management strategies amidst increasing regulatory scrutiny and cybersecurity risks. It emphasizes the necessity for…