Advertisement · 728 × 90

Posts by St Andrews CS Data Ethics

If you wanted no leaks you should have gone into Settings -> Security -> Configure privacy & security -> Privacy options -> Other -> Configure -> Media interface and clicked “Disallow.”

The Leak setting is on by default but we understand your privacy is important so we’ve made it easy to opt out

1 year ago 31678 5468 827 271
Even though technological advancements can be useful for work-
ers who can work remotely, and be at times faster and more efficient, they also
pose serious threats to workers’ privacy. In this article, we focus on practices that
greatly blur the line between workers’ private life and life at work, such as the
practices of ‘bring your own device’ (BYOD) and linking cloud storage to per-
sonal and work devices. The first of these sees workers allowed to use their per-
sonal devices for work-related activities, which can be convenient, familiar, and
supportive of flexible working, potentially for several employers. The second of
these sees workers using online storage for both personal and professional reas-
ons and linking this storage to personal and work devices, which can again be a
simple and efficient way to save and backup information and materials. However,
practices such as these also present challenges for workers’ privacy, particularly
when other legal frameworks are implicated. Employers may have legitimate
reasons and a legal basis to request access to, control and search workers’ devices
on the basis of, inter alia, data protection, freedom of information, or civil pro-
cedural rules. These rules may promote other legitimate goals. However, in this
instance, when individuals often do not separate their private and professional
activities cleanly within or across devices in a way that can be searched for, the
legal regimes in question can pose threats to privacy. These regimes may re-
quire analysis of unseparated material through accessing data and devices. The
threat to workers’ privacy is obvious. In this article we examine this trend with
a primary focus on UK and European law. We propose that workers’ right to
private life should be understood as a right to supported separation of work and
private contexts and a right to control the process of a search of data and devices.

Even though technological advancements can be useful for work- ers who can work remotely, and be at times faster and more efficient, they also pose serious threats to workers’ privacy. In this article, we focus on practices that greatly blur the line between workers’ private life and life at work, such as the practices of ‘bring your own device’ (BYOD) and linking cloud storage to per- sonal and work devices. The first of these sees workers allowed to use their per- sonal devices for work-related activities, which can be convenient, familiar, and supportive of flexible working, potentially for several employers. The second of these sees workers using online storage for both personal and professional reas- ons and linking this storage to personal and work devices, which can again be a simple and efficient way to save and backup information and materials. However, practices such as these also present challenges for workers’ privacy, particularly when other legal frameworks are implicated. Employers may have legitimate reasons and a legal basis to request access to, control and search workers’ devices on the basis of, inter alia, data protection, freedom of information, or civil pro- cedural rules. These rules may promote other legitimate goals. However, in this instance, when individuals often do not separate their private and professional activities cleanly within or across devices in a way that can be searched for, the legal regimes in question can pose threats to privacy. These regimes may re- quire analysis of unseparated material through accessing data and devices. The threat to workers’ privacy is obvious. In this article we examine this trend with a primary focus on UK and European law. We propose that workers’ right to private life should be understood as a right to supported separation of work and private contexts and a right to control the process of a search of data and devices.

Work and private data are more enmeshed than ever: both in the cloud & on devices. What happens to employee privacy when data access or FOI requests require searching through private info?

New 📄 from @vmantouvalou.bsky.social and me: "Bring Your Own Device—Now Hand It Over!"
doi.org/10.31219/osf...

1 year ago 52 25 4 1
A Big Day for Tech Earnings | Bloomberg: The Close 1/29/2025
A Big Day for Tech Earnings | Bloomberg: The Close 1/29/2025 YouTube video by Bloomberg Television

I got on Bloomberg News yesterday to talk about AI and the DeepSeek hullabaloo.

You can find my segment starting on minute 58.
www.youtube.com/watch?v=nh7-...

1 year ago 80 19 2 4
Preview
‘Impossible’ to create AI tools like ChatGPT without copyrighted material, OpenAI says Pressure grows on artificial intelligence firms over the content used to train their products

And of course I would have been remiss if we didn't at least mention the technology du jour. www.theguardian.com/technology/2...

1 year ago 0 0 0 0
Preview
a man is sitting at a table with his eyes closed and saying `` i 've heard it both ways '' . ALT: a man is sitting at a table with his eyes closed and saying `` i 've heard it both ways '' .

And the (possibly apocryphal?) Target personalised shopping story www.forbes.com/sites/kashmi...

I've heard that it may or may not be true, but even if it isn't, it's quite plausible.

1 year ago 0 0 1 0
Preview
Fitness tracking app Strava gives away location of secret US army bases Data about exercise routes shared online by soldiers can be used to pinpoint overseas facilities

We touched on sensitive location tracking and sharing in Afghanistan www.theguardian.com/world/2018/j...

1 year ago 0 0 1 0
Preview
When It Comes to Gorillas, Google Photos Remains Blind Google promised a fix after its photo-categorization software labeled black people as gorillas in 2015. More than two years later, it hasn't found one.

Today we had a gentle introduction to the module by talking about some stories that involved controversial uses of data. I won't post them all, but we started with the Google Photos gorilla tagging story. www.wired.com/story/when-i...

1 year ago 0 0 1 0
Advertisement
Preview
Controversies in the Data Society 2025 A cross disciplinary series of public lectures and discussions on AI and the datafication of society.

Controversies in the Data Society Full Programme now available! We have a fantastic lineup of speakers and guests addressing topics from egovernment and digital democracy to climate change resilience and creative authenticity
www.eventbrite.com/cc/controver... @stis-uoe.bsky.social

1 year ago 7 6 1 0
Video

Cyberlibertarianism has shaped how we see the internet. As tech aligns with the extreme right, it’s more important than ever to reassess it.

This week @hypervisible.bsky.social joins @parismarx.com to discuss David Golumbia’s book on cyberlibertarianism.

Full ep: techwontsave.us/episode/261_...

1 year ago 279 118 9 22

Yes, I am talking to myself. Yes, academics are not renowned for their sanity.

1 year ago 0 0 0 0

Class starts today! Get off the beach and get to work.

1 year ago 0 0 1 0

This is also what annoys me about companies selling off articles and books to train AI. I can’t get access to that as a scholar without major fees paid by me or my library system. Why does AI get it?

1 year ago 213 62 2 2

people can be biased and subjective so let’s use a system to evaluate research outputs and impact whose subjectivity we can more easily forget about!

1 year ago 10 2 2 0
Preview
U.S. Navy bans use of DeepSeek due to 'security and ethical concerns' The U.S. Navy issued a warning to its members to avoid using DeepSeek "in any capacity," due to "potential security and ethical concerns."

It would be interesting to learn more about these ethical concerns and how they apply to other LLMs as well.

www.cnbc.com/2025/01/28/u...

1 year ago 0 0 0 0

Wow. it must feel terrible when someone takes something you made and uses it without permission or payment

1 year ago 18940 5061 180 84
“Columbian president condemned something,” notification from X reads

“Columbian president condemned something,” notification from X reads

Apple Intelligence’s commitment to writing incomprehensible summaries is unparalleled

1 year ago 7827 574 262 100
Advertisement
Post image Post image

#DataPrivacyDay reminds us about the importance of protecting personal information in our hyperconnected world. EPIC is proud to fight every day for digital transparency, privacy, and data safeguards.

Join us in the privacy movement & protect your data by checking out the data privacy tips below. ⬇️

1 year ago 9 7 3 1
Preview
Gov.uk app could lead to ‘mandatory ID scheme’, claim privacy groups App and wallet would allow people to carry digital versions of key documents such as driving licence on their phones

"One future problem is it ends up evolving into a national identity database where every interaction is tracked, which has considerable privacy implications.”

🗣️ ORG's James Baker on the UK government's proposals for a gov.uk app and wallet.

www.theguardian.com/technology/2...

1 year ago 6 5 1 0
Post image

From the UK 'newspaper' that brought you the Liz Truss lettuce, the 'psycho scumbag chatbots'

1 year ago 5 2 0 1
Preview
Experts urge caution over use of Chinese AI DeepSeek Oxford professor advises against putting private data on platform in case it could be shared with Chinese state

With all due respect to my British colleagues, the problem of personal #data is not uniquely bad if it's #China that gets it. Losing control over your date to any sufficiently powerful entity is bad, and it's probably worse for your (western) life if say, the insurance industry, gets it.

1 year ago 35 17 1 1

This morning I read that DeepSeek used training data generated from other language models which has companies like OpenAI fuming, and I can't stop thinking about how there's a lesson in there

1 year ago 4915 565 128 61

"Deleting the model, removing the personal data requested to be erased, and then retraining the model with the rest of the data is the method that implements the rights in Articles 16-17 of the GDPR effectively" www.edpb.europa.eu/system/files...

1 year ago 5 6 0 1

Hugely important UK case on manipulative "consent" obtained by online gambling sites. Not only isn't lawful grounds for data processing on these sites, but huge implications for adtech too - and legitimate interests also probably excluded given interests of data subject.

1 year ago 12 14 0 0
Video

DATA VAMPIRES is a four-part series digging into the costs of hyperscale data centers and why tech billionaires are so desperate to build more.

In Part 1, we explore where “the cloud” came from and how it expands the power of Amazon, Microsoft, and Google.

Full ep: techwontsave.us/episode/241_...

1 year ago 496 166 30 56
Advertisement
Preview
Review of legal rule on computer evidence long overdue, say Post Office scandal victims | Computer Weekly Computer Weekly talks to people who suffered miscarriages of justice at the hands of flawed computer evidence as well as experts in law and IT, as the government commits to review the legal presumptio...

The government is reviewing the legal presumption that electronic evidence is reliable. I was one of several experts to comment on this news. www.computerweekly.com/news/3666183...

1 year ago 30 17 1 0
Preview
We're Doing AI Phrenology Again AI phrenology might be bad, say Ivy League economics professors in 61-page paper about how AI phrenology is accurate.

Again, and again, and…

1 year ago 117 33 7 8
Preview
Porn site age checking rules 'could put people at risk of scammers' Websites that host adult content, including social media sites, will have to put in place age verification systems by this July at the latest.

"We’re concerned about any method that could put people’s data at risk... [which] is incredibly sensitive if it can be linked to porn habits."

There needs to be a specific and enforceable guarantee that age verification systems will be private, safe and secure.

uk.news.yahoo.com/porn-site-uk...

1 year ago 7 6 1 1
Party In The CIA (Parody of "Party In The U.S.A." by Miley Cyrus) (Official 4K Video)
Party In The CIA (Parody of "Party In The U.S.A." by Miley Cyrus) (Official 4K Video) YouTube video by alyankovicVEVO

www.youtube.com/watch?v=C-CG...

1 year ago 0 0 0 0
Metallica: Master of Puppets (Live) (Official Music Video)
Metallica: Master of Puppets (Live) (Official Music Video) YouTube video by Metallica

www.youtube.com/watch?v=hx27...

1 year ago 0 0 1 0
Stanton Warriors - Prisoner
Stanton Warriors - Prisoner YouTube video by Major55

www.youtube.com/watch?v=1XO1...

1 year ago 0 0 1 0