Police in South Korea are investigating Google's privacy policies over what one official said are concerns that the company's "AdMob collected personal location information without consent or approval from the Korean Communication Commission." Investigators raided the company's Seoul offices on Tuesday morning, The Register reports.
Full Story
shareShare This
Related Stories
IAF looks to the privacy industry's future
In a blog post, Information Accountability Foundation Chief Strategy Officer Elizabeth Denham talks about the future of the privacy industry as it faces new challenges. She encouraged readers to broaden their assessments, study new artificial intelligence law requirements and think creatively about ...
Apple expected to launch iOS 18 with AI functions
Apple is expected to launch its iPhone iOS 18 update with artificial intelligence functions that do not use cloud processing technology, Forbes reports. ESET Global Cybersecurity Advisor Jake Moore said having the technology within the device could mean users "have more comfort in the knowledge that...
Companies begin rolling out chief AI officer appointments
Major companies are creating chief artificial intelligence officer positions to oversee the responsible use and integration of the technology, the Financial Times reports. Responsibilities CAIOs are being tasked with include facilitating the deployment of both generative AI systems and other AI tech...
Notes from the Asia-Pacific region, 12 April 2024
Kia ora koutou,
Back in August 2023, I wrote about the release of a consultation paper on the regulation of biometrics by New Zealand's Office of the Privacy Commissioner. In the paper, the OPC indicated its intention to issue a code of practice regulating the use of biometric technologies. In the ...
PCPD releases report on Cyberport cyberattack
Hong Kong's Office of the Privacy Commissioner for Personal Data released its investigative report on a cyberattack on Cyberport that affected 13,000 people. The PCPD said Cyberport "failed to implement sufficient and effective measures to ensure the security of its information systems prior to the ...
Comments
If you want to comment on this post, you need to login.