Privacy Protection
Search documents
ZTE earns EU ePrivacyseal for Network & smart home
Theregister· 2025-11-27 07:32
Core Insights - ZTE Corporation has successfully obtained the ePrivacyseal Global certificate for five of its core fixed network and smart home products, showcasing its strong technical capabilities and compliance in data security and privacy protection [1][2][5] Product Certification Details - The certified products include the ZXA10 C600 series OLT equipment, ZENIC ONE R20 access network management system, SCP cloud-based smart management platform, SMP set-top box management platform, and ZLife smart home app, providing end-to-end privacy protection across the optical access chain [2][6] - The certification validates ZTE's full-link privacy coverage, ensuring compliance with stringent GDPR requirements and emphasizing the company's commitment to privacy-by-design [6][7] Compliance and Security Enhancements - Achieving the ePrivacyseal Global certification strengthens ZTE's legal compliance and enhances its security capabilities in user authorization, data encryption, and access control, providing assurance for international business expansion [5][6] - The certification process involves rigorous audits that assess both legal requirements and technical implementations, ensuring products operate securely under strict compliance frameworks [4][7] Industry Context - In the context of global digitalization, privacy protection and data security are essential for technology companies, with the ePrivacyseal Global certification serving as a key compliance benchmark for enterprises entering the European market [7]
Rekor Systems Offers Policymakers a Privacy-Protected and Responsible Path Forward for the Use of Automated License Plate Recognition
Globenewswire· 2025-11-19 12:00
Core Viewpoint - Rekor Systems, Inc. has developed a patented technology framework aimed at protecting personal privacy in the use of vehicle recognition data, particularly through automated license plate recognition (ALPR) systems, addressing growing concerns over surveillance and data sharing [1][2]. Technology Framework - The company has secured a patent for a method that encodes and anonymizes vehicle identification data at the point of collection, ensuring that specific vehicle information remains encrypted and accessible only with lawful authorization [2]. - This framework aims to establish consistent privacy safeguards through administrative guidance, legislation, or procurement rules, allowing public safety agencies to adopt it without disrupting current operations [4]. Privacy Safeguards - Key elements of Rekor's privacy framework include immediate encoding of vehicle identification data, real-time use of deidentified information for legitimate purposes, and the release of identifying information only upon receipt of a warrant or legally approved documentation [7]. - The framework also provides real-time access to "hot-listed" wanted vehicles to support urgent public safety needs [7]. Industry Impact - The innovative approach is designed to enhance public trust and accountability in ALPR programs, encouraging public safety agencies and policymakers to implement privacy-protected ALPR systems [5][6]. - Rekor Systems aims to provide this patented privacy framework to any authorized government agency seeking to improve privacy protections while maintaining operational efficiency [5].
Apple prepares to comply with Texas age assurance law, but warns of privacy risks
TechCrunch· 2025-10-09 14:38
Core Points - Apple is making changes to comply with Texas state law SB2420, which introduces age assurance requirements for app stores and developers [1][2] - The law raises privacy concerns as it mandates the collection of sensitive personal information for app downloads [2] - Smaller developers may struggle to comply with such laws without Apple's tools, impacting their operations [3] Compliance Details - The law will take effect on January 1, 2026, requiring Apple to confirm if Texas users are 18 or older, with minors needing parental consent for app downloads [4] - Apple plans to assist developers in determining user age in a privacy-preserving manner through its Declared Age Range API [5] - New APIs will be introduced to facilitate parental consent for significant app changes, with the ability for parents to revoke consent [6] Broader Context - The Texas law is part of a trend where states are creating their own regulations due to the lack of federal internet regulations to protect minors [2] - Similar laws are anticipated in Utah and Louisiana, prompting developers to prepare for compliance [6]
Myseum Issues Letter to Shareholders Featuring Operational Progress, Technology Advancements and Strategic Roadmap
Globenewswire· 2025-10-08 12:23
Core Insights - Myseum, Inc. is set to launch a new social sharing platform called "Picture Party by Myseum" this fall, focusing on privacy and security in the age of generative AI [1][2][3] Company Progress - The past year has been dedicated to building a strong foundation, emphasizing the importance of privacy in the face of evolving AI technologies [3] - Myseum has made significant advancements in technology to ensure that user-generated content remains protected from AI data collection [5] New Platform Features - "Picture Party by Myseum" will offer a dynamic way for users to share photos and videos securely, enhancing user experience while prioritizing privacy [6] - The platform will be supported by a dedicated website, pictureparty.com, which will play a crucial role in marketing and promotional efforts [6] Additional Offerings - A new service called "Pop-Up Gala by Myseum" will cater to formal events, utilizing the same technology as the Picture Party platform and will operate on a subscription model [7] Marketing and Partnerships - Myseum has partnered with Spitball, a creative agency, to lead branding and digital marketing efforts for the new platform [8] - Otter PR has been engaged as the public relations agency to enhance Myseum's brand visibility and outreach [10] Intellectual Property - Myseum's intellectual property portfolio now includes 17 issued patents and several pending applications, reinforcing its commitment to innovation [11] Future Outlook - The company believes that the new platform addresses significant issues in the current social media landscape, providing a fun and functional way to share media while ensuring privacy [12]
Microsoft cuts off cloud services to Israeli military unit after report of storing Palestinians' phone calls
CNBC· 2025-09-25 16:13
Core Points - Microsoft has ceased providing certain services to a division of the Israeli Ministry of Defense following an investigation into reports of the Israeli Defense Forces' Unit 8200 tracking Palestinians' phone calls [1][2][3] - The decision was influenced by employee protests against the company's software being used in the context of the Gaza invasion, leading to the termination of five employees involved in the protests [3][4] - Microsoft disabled cloud-based storage and AI subscriptions used by the Israeli defense agency, emphasizing that it does not review customer data for such investigations [4][5] Company Actions - Microsoft conducted a review prompted by a report from The Guardian, which revealed potential misuse of its services by the Israeli military [2][3] - The company communicated its decision to Israeli defense officials, indicating a commitment to privacy protection and trust in its services [4][5] - Following the cessation of services, it was reported that Unit 8200 may migrate its operations to Amazon Web Services, highlighting competitive dynamics in the cloud services market [5]
UK drops Apple encryption demands, says US spy chief
Sky News· 2025-08-19 10:49
Core Viewpoint - The UK government has retracted its demand for Apple to create a backdoor for accessing encrypted user data, which would have compromised civil liberties and privacy for American citizens [1][8]. Group 1: Government Actions - The UK had previously ordered Apple to develop a method for its security services to access encrypted user data through Technical Capability Notices (TCN), which are not publicly disclosed [2]. - A UK government spokesperson confirmed the existence of long-standing joint security and intelligence arrangements with the US to address serious threats, while emphasizing the importance of privacy safeguards [5][6]. Group 2: Apple’s Response - Following the UK government's demands, Apple withdrew its "advanced data protection" feature for UK users, which provided end-to-end encryption for cloud data storage [2][7]. - Apple cited the increasing risks of data breaches and threats to customer privacy as reasons for the withdrawal of this feature [7]. Group 3: Reactions and Implications - US intelligence chief Tulsi Gabbard expressed concerns about any country requiring companies like Apple to create backdoors, labeling it a violation of privacy and civil liberties [8]. - Civil rights groups welcomed the UK’s decision to drop the backdoor demand, viewing it as a positive step towards protecting private data [9]. - Concerns remain regarding the Investigatory Powers Act, which could allow future governments to impose similar demands on encryption services [10].
X @TechCrunch
TechCrunch· 2025-07-23 11:06
Instagram adds new protections for accounts that primarily feature children | TechCrunch https://t.co/VrHEf4Qe1k ...
你的隐私你做主,所有人都应该知道的9个iPhone隐私保护技巧
3 6 Ke· 2025-06-05 12:58
Core Points - The article emphasizes the importance of protecting personal data and privacy on iPhones, given the sensitive information stored on these devices [1]. Group 1: Biometric Security Features - Biometric recognition technology, such as Touch ID and Face ID, allows iPhones to securely identify users based on unique physical traits, with data stored locally and encrypted [2]. - The latest iOS 18 includes an "app locking" feature to enhance privacy protection [2]. - Users can customize permissions for device locking in the settings menu [6]. Group 2: Notification and Widget Management - Disabling the "Today" view prevents access to widgets without unlocking the device, enhancing privacy [7]. - Users are advised to manage which widgets display sensitive information on the "negative one screen" [8]. Group 3: Password Management - iOS 18 introduces a password app for easier management of passwords, allowing users to identify security vulnerabilities in their passwords [20][22]. - The password app integrates with iCloud Keychain for seamless password migration and strong password creation [22]. Group 4: Network Security - iOS includes features like "private Wi-Fi address" and "IP address tracking limitation" to enhance security on public Wi-Fi networks [16][18]. - Safari provides a "privacy report" to track and block website trackers [18]. Group 5: App Permissions and Privacy - Users are encouraged to carefully manage app permissions to prevent unauthorized access to sensitive information [24][26]. - iOS allows for temporary permissions for specific actions, such as sharing location without granting permanent access [26][28]. Group 6: iCloud Security - Enabling two-factor authentication for Apple accounts is crucial to protect iCloud data from unauthorized access [35]. - Users can manually select what data is stored in iCloud to minimize potential data loss [36]. Group 7: Device Loss Prevention - Regular backups of iPhone data are recommended to prevent data loss in case of theft or loss [40]. - The "Find My" feature allows users to locate their devices and manage data remotely [42][45]. Group 8: SIM Card Security - Activating SIM card lock can prevent unauthorized access to accounts linked to the phone number [47][49]. Group 9: Additional Privacy Features - The "Guided Access" feature can restrict access to certain functions when handing the phone to others [50]. - iOS provides options to hide apps and manage privacy settings comprehensively [52].