If you wanted no leaks you should have gone into Settings -> Security -> Configure privacy & security -> Privacy options -> Other -> Configure -> Media interface and clicked “Disallow.”
The Leak setting is on by default but we understand your privacy is important so we’ve made it easy to opt out
Posts by St Andrews CS Data Ethics
Even though technological advancements can be useful for work- ers who can work remotely, and be at times faster and more efficient, they also pose serious threats to workers’ privacy. In this article, we focus on practices that greatly blur the line between workers’ private life and life at work, such as the practices of ‘bring your own device’ (BYOD) and linking cloud storage to per- sonal and work devices. The first of these sees workers allowed to use their per- sonal devices for work-related activities, which can be convenient, familiar, and supportive of flexible working, potentially for several employers. The second of these sees workers using online storage for both personal and professional reas- ons and linking this storage to personal and work devices, which can again be a simple and efficient way to save and backup information and materials. However, practices such as these also present challenges for workers’ privacy, particularly when other legal frameworks are implicated. Employers may have legitimate reasons and a legal basis to request access to, control and search workers’ devices on the basis of, inter alia, data protection, freedom of information, or civil pro- cedural rules. These rules may promote other legitimate goals. However, in this instance, when individuals often do not separate their private and professional activities cleanly within or across devices in a way that can be searched for, the legal regimes in question can pose threats to privacy. These regimes may re- quire analysis of unseparated material through accessing data and devices. The threat to workers’ privacy is obvious. In this article we examine this trend with a primary focus on UK and European law. We propose that workers’ right to private life should be understood as a right to supported separation of work and private contexts and a right to control the process of a search of data and devices.
Work and private data are more enmeshed than ever: both in the cloud & on devices. What happens to employee privacy when data access or FOI requests require searching through private info?
New 📄 from @vmantouvalou.bsky.social and me: "Bring Your Own Device—Now Hand It Over!"
doi.org/10.31219/osf...
I got on Bloomberg News yesterday to talk about AI and the DeepSeek hullabaloo.
You can find my segment starting on minute 58.
www.youtube.com/watch?v=nh7-...
And of course I would have been remiss if we didn't at least mention the technology du jour. www.theguardian.com/technology/2...
And the (possibly apocryphal?) Target personalised shopping story www.forbes.com/sites/kashmi...
I've heard that it may or may not be true, but even if it isn't, it's quite plausible.
We touched on sensitive location tracking and sharing in Afghanistan www.theguardian.com/world/2018/j...
Today we had a gentle introduction to the module by talking about some stories that involved controversial uses of data. I won't post them all, but we started with the Google Photos gorilla tagging story. www.wired.com/story/when-i...
Controversies in the Data Society Full Programme now available! We have a fantastic lineup of speakers and guests addressing topics from egovernment and digital democracy to climate change resilience and creative authenticity
www.eventbrite.com/cc/controver... @stis-uoe.bsky.social
Cyberlibertarianism has shaped how we see the internet. As tech aligns with the extreme right, it’s more important than ever to reassess it.
This week @hypervisible.bsky.social joins @parismarx.com to discuss David Golumbia’s book on cyberlibertarianism.
Full ep: techwontsave.us/episode/261_...
Yes, I am talking to myself. Yes, academics are not renowned for their sanity.
Class starts today! Get off the beach and get to work.
This is also what annoys me about companies selling off articles and books to train AI. I can’t get access to that as a scholar without major fees paid by me or my library system. Why does AI get it?
people can be biased and subjective so let’s use a system to evaluate research outputs and impact whose subjectivity we can more easily forget about!
It would be interesting to learn more about these ethical concerns and how they apply to other LLMs as well.
www.cnbc.com/2025/01/28/u...
Wow. it must feel terrible when someone takes something you made and uses it without permission or payment
“Columbian president condemned something,” notification from X reads
Apple Intelligence’s commitment to writing incomprehensible summaries is unparalleled
#DataPrivacyDay reminds us about the importance of protecting personal information in our hyperconnected world. EPIC is proud to fight every day for digital transparency, privacy, and data safeguards.
Join us in the privacy movement & protect your data by checking out the data privacy tips below. ⬇️
"One future problem is it ends up evolving into a national identity database where every interaction is tracked, which has considerable privacy implications.”
🗣️ ORG's James Baker on the UK government's proposals for a gov.uk app and wallet.
www.theguardian.com/technology/2...
From the UK 'newspaper' that brought you the Liz Truss lettuce, the 'psycho scumbag chatbots'
With all due respect to my British colleagues, the problem of personal #data is not uniquely bad if it's #China that gets it. Losing control over your date to any sufficiently powerful entity is bad, and it's probably worse for your (western) life if say, the insurance industry, gets it.
This morning I read that DeepSeek used training data generated from other language models which has companies like OpenAI fuming, and I can't stop thinking about how there's a lesson in there
"Deleting the model, removing the personal data requested to be erased, and then retraining the model with the rest of the data is the method that implements the rights in Articles 16-17 of the GDPR effectively" www.edpb.europa.eu/system/files...
Hugely important UK case on manipulative "consent" obtained by online gambling sites. Not only isn't lawful grounds for data processing on these sites, but huge implications for adtech too - and legitimate interests also probably excluded given interests of data subject.
DATA VAMPIRES is a four-part series digging into the costs of hyperscale data centers and why tech billionaires are so desperate to build more.
In Part 1, we explore where “the cloud” came from and how it expands the power of Amazon, Microsoft, and Google.
Full ep: techwontsave.us/episode/241_...
The government is reviewing the legal presumption that electronic evidence is reliable. I was one of several experts to comment on this news. www.computerweekly.com/news/3666183...
"We’re concerned about any method that could put people’s data at risk... [which] is incredibly sensitive if it can be linked to porn habits."
There needs to be a specific and enforceable guarantee that age verification systems will be private, safe and secure.
uk.news.yahoo.com/porn-site-uk...
www.youtube.com/watch?v=C-CG...
www.youtube.com/watch?v=hx27...
www.youtube.com/watch?v=1XO1...