Privacy

Some families push back against journalists who mine social media for photos – they have every right to

Retrieved on: 
Friday, April 19, 2024

Their appeal is immediately understandable – many people would be upset by seeing photos of a loved one everywhere after such a traumatic event.

Key Points: 
  • Their appeal is immediately understandable – many people would be upset by seeing photos of a loved one everywhere after such a traumatic event.
  • There has been valuable commentary about the issues surrounding the common journalistic practice of mining social media after a “newsworthy” death.
  • My PhD research offers further insight into a perspective that is rarely shared: the view of families bereaved through homicide.

Private photos in the public domain

  • When these photos enter the public domain following homicide, they become photos of a victim.
  • In this new domain, private photos serve altogether different purposes.
  • My research indicates this is an issue that persists long into the aftermath of homicide, well after media and public interest has dissipated.

Judging victims

  • My research uncovers how details in a photo can be highlighted and twisted at the expense of others.
  • One mother recalled how her son would do a silly pose and ruin their family photos.
  • Instead, the mother read comments made by the public underneath the article that said her son deserved to be murdered.

The right to control

  • The bereaved deserve to be in control of that decision.
  • Allowing them to make that choice themselves gives the bereaved agency at a time when they feel most powerless.


Laura Wajnryb McDonald does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

In Knife, his memoir of surviving attack, Salman Rushdie confronts a world where liberal principles like free speech are old-fashioned

Retrieved on: 
Friday, April 19, 2024

A man named Hadi Matar has been charged with second-degree attempted murder.

Key Points: 
  • A man named Hadi Matar has been charged with second-degree attempted murder.
  • He is an American-born resident of New Jersey in his early twenties, whose parents emigrated from Lebanon.
  • Review: Knife: Meditations After an Attempted Murder – Salman Rushdie (Jonathan Cape) Knife is very good at recalling Rushdie’s grim memories of the attack.
  • “Let me offer this piece of advice to you, gentle reader,” he says: “if you can avoid having your eyelid sewn shut … avoid it.
  • Here, for a number of reasons, Rushdie is not on such secure ground.
  • Read more:
    How Salman Rushdie has been a scapegoat for complex historical differences

    Rushdie, who studied history at Cambridge University, described himself in Joseph Anton as “a historian by training”.

  • Indeed, a speech he gave at PEN America in 2022 is reprinted in the book verbatim.
  • For these intellectuals, principles of secular reason and personal liberty should always supersede blind conformity to social or religious authority.

Old-fashioned liberal principles

  • In Knife, though, Rushdie the protagonist confronts a world where such liberal principles now appear old-fashioned.
  • He claims “the groupthink of radical Islam” has been shaped by “the groupthink-manufacturing giants, YouTube, Facebook, Twitter”.
  • But for many non-religious younger people, any notion of free choice also appears illusory, the anachronistic residue of an earlier age.
  • Millennials and Generation Z are concerned primarily with issues of environmental catastrophe and social justice, and they tend to regard liberal individualism as both ineffective and self-indulgent.
  • A new book traces how we got here, but lets neoliberal ideologues off the hook

Suffused in the culture of Islam

  • The Satanic Verses itself is suffused in the culture of Islam as much as James Joyce’s Ulysses is suffused in the culture of Catholicism.
  • In their hypothetical conversation, the author of Knife tries to convince his assailant of the value of such ambivalence.
  • He protests how his notorious novel revolves around “an East London Indian family running a café-restaurant, portrayed with real love”.

Attachment to past traditions

  • Rushdie discusses in Knife how, besides the Hindu legends of his youth, he has also been “more influenced by the Christian world than I realized”.
  • He cites the music of Handel and the art of Michelangelo as particular influences.
  • Yet this again highlights Rushdie’s attachments to traditions firmly rooted in the past.
  • Part of James’s greatness lay in the way he was able to accommodate these radical shifts within his writing.

‘A curiously one-eyed book’

  • Particularly striking are the immediacy with which he recalls the shocking assault, the black humour with which he relates medical procedures and the sense of “exhilaration” at finally returning home with his wife to Manhattan.
  • Yet there are also many loose ends, and the book’s conclusion, that the assailant has in the end become “simply irrelevant” to him, is implausible.
  • He insists he does not want to write “frightened” or “revenge” books.
  • This was despite several brave comeback attempts by Milburn that likewise cited Pataudi as an example.
  • Knife, by contrast, is a curiously one-eyed book, in a metaphorical, as well as a literal sense.


Paul Giles does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

Are tomorrow’s engineers ready to face AI’s ethical challenges?

Retrieved on: 
Friday, April 19, 2024

A test version of a Roomba vacuum collects images of users in private situations.

Key Points: 
  • A test version of a Roomba vacuum collects images of users in private situations.
  • The general public depends on software engineers and computer scientists to ensure these technologies are created in a safe and ethical manner.
  • What’s more, some appear apathetic about the moral dilemmas their careers may bring – just as advances in AI intensify such dilemmas.

Aware, but unprepared

  • We asked students about their experiences with ethical challenges in engineering, their knowledge of ethical dilemmas in the field and how they would respond to scenarios in the future.
  • When asked, however, “Do you feel equipped to respond in concerning or unethical situations?” students often said no.
  • “Do YOU know who I’m supposed to go to?” Another was troubled by the lack of training: “I [would be] dealing with that with no experience.


Other researchers have similarly found that many engineering students do not feel satisfied with the ethics training they do receive. Common training usually emphasizes professional codes of conduct, rather than the complex socio-technical factors underlying ethical decision-making. Research suggests that even when presented with particular scenarios or case studies, engineering students often struggle to recognize ethical dilemmas.

‘A box to check off’

  • A study assessing undergraduate STEM curricula in the U.S. found that coverage of ethical issues varied greatly in terms of content, amount and how seriously it is presented.
  • Additionally, an analysis of academic literature about engineering education found that ethics is often considered nonessential training.
  • [Misusage] issues are not their concern.” One of us, Erin Cech, followed a cohort of 326 engineering students from four U.S. colleges.
  • Following them after they left college, we found that their concerns regarding ethics did not rebound once these new graduates entered the workforce.

Joining the work world

  • When engineers do receive ethics training as part of their degree, it seems to work.
  • Along with engineering professor Cynthia Finelli, we conducted a survey of over 500 employed engineers.
  • Over a quarter of these practicing engineers reported encountering a concerning ethical situation at work.
  • Yet approximately one-third said they have never received training in public welfare – not during their education, and not during their career.


Elana Goldenkoff receives funding from National Science Foundation and Schmidt Futures. Erin A. Cech receives funding from the National Science Foundation.

TikTok fears point to larger problem: Poor media literacy in the social media age

Retrieved on: 
Friday, April 19, 2024

The U.S. government moved closer to banning the video social media app TikTok after the House of Representatives attached the measure to an emergency spending bill on Apr.

Key Points: 
  • The U.S. government moved closer to banning the video social media app TikTok after the House of Representatives attached the measure to an emergency spending bill on Apr.
  • The move could improve the bill’s chances in the Senate, and President Joe Biden has indicated that he will sign the bill if it reaches his desk.
  • The bill would force ByteDance, the Chinese company that owns TikTok, to either sell its American holdings to a U.S. company or face a ban in the country.
  • For one, ByteDance can be required to assist the Chinese Communist Party in gathering intelligence, according to the Chinese National Intelligence Law.
  • The fact that China, a country that Americans criticize for its authoritarian practices, bans social media platforms is hardly a reason for the U.S. to do the same.
  • Here’s why I think the recent move against TikTok misses the larger point: Americans’ sources of information have declined in quality and the problem goes beyond any one social media platform.

The deeper problem

  • But the proposed solution of switching to American ownership of the app ignores an even more fundamental threat.
  • The deeper problem is not that the Chinese government can easily manipulate content on the app.
  • It is, rather, that people think it is OK to get their news from social media in the first place.
  • In other words, the real national security vulnerability is that people have acquiesced to informing themselves through social media.

Media and technology literacy

  • Research suggests that it will only be alleviated by inculcating media and technology literacy habits from an early age.
  • My colleagues and I have just launched a pilot program to boost digital media literacy with the Boston Mayor’s Youth Council.
  • Some of these measures to boost media and technology literacy might not be popular among tech users and tech companies.


The Applied Ethics Center at UMass Boston receives funding from the Institute for Ethics and Emerging Technologies. Nir Eisikovits serves as the data ethics advisor to Hour25AI, a startup dedicated to reducing digital distractions.

Press release - Child sexual abuse online: current rules extended until April 2026

Retrieved on: 
Thursday, April 18, 2024

Child sexual abuse online: current rules extended until April 2026

Key Points: 
  • Child sexual abuse online: current rules extended until April 2026
    - Measures in place, set to expire next August, to remain in force until 3 April 2026
    - MEPs stress the need to agree on a permanent framework
    On Wednesday Parliament backed prolonging an exemption to EU privacy rules facilitating the detection of child sexual abuse material online until 3 April 2026.
  • The derogation will be extended until 3 April 2026 so that an agreement on the long-term legal framework to prevent and combat child sexual abuse online can be reached.
  • Quote
    Rapporteur Birgit Sippel (S&D, Germany) said: “Child sexual abuse is a horrible crime and we need to prevent its spread online.
  • For this reason, we have agreed to extend the derogation that allows some companies to use technology to detect online child sexual abuse material.

The legal rule that means even Hugh Grant can’t afford to take his case to trial

Retrieved on: 
Thursday, April 18, 2024

As actor Hugh Grant’s decision to settle his privacy claim against News Group Newspapers (NGN) shows, sometimes principles just cost too much.

Key Points: 
  • As actor Hugh Grant’s decision to settle his privacy claim against News Group Newspapers (NGN) shows, sometimes principles just cost too much.
  • Grant announced he had reluctantly accepted an “enormous sum of money” to settle his claim against the Murdoch-owned NGN, the publisher of The Sun.
  • He has accused the publisher of “phone hacking, unlawful information gathering” and “landline tapping” among other allegations, which they have denied.
  • If he took the case to trial, he risked being ordered to pay NGN’s legal costs, which his lawyers advised could exceed £10 million.

What is a trial worth?

  • They avoid the costs, stress and delay of a trial, and the court service is better able to cope with the high volume of other cases in the system.
  • It is clear from Grant’s statements that his motivation was to hold NGN to account for unlawful information gathering.

Holding companies to account

  • There is arguably a balance to be struck between the individualistic view of this case as just an issue between one person and a media company, and the wider public interest angle: that it should be possible to use the court system to hold big companies to account.
  • There has always been an element of bigger companies using their deep pockets in litigation, but this rule adds another layer of protection for those that can afford to make a generous offer.


Megan Shirley does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

Draft revised Heads of Medicines Agency / European Medicines Agency guidance document on the identification of personal data and commercially confidential information within the structure of the marketing authorisation application dossier

Retrieved on: 
Thursday, April 18, 2024
Steps, Union, Patient, CTD, Syndrome, CCI, Local, Disclosure, Toxicity, Process validation, MAH, Clinical trial, IP, RMP, Pharmacovigilance, Cell, Legislation, Annex, Trial of the century, Escherichia coli, Safety, Pediatrics, INTRODUCTION, Documentation, Prevalence, Vital signs, Tablet, Design, Transparency, Conclusion, Pip, Analysis, European Parliament, INN, Record, Quality, Generic, Biology, CMO, Genotoxicity, Composition, CTIS, Uncontrolled, Health care, European Medicines Agency, Prejudice, Committee, Policy, HCP, Animal, Characterization, Cell bank, Fertility, IRB, CMOS, Risk management, Private law, European Pharmacopoeia, Telephone, Research, Good, Data Protection Directive, Ampere-hour, IEC, QP, Human, Personal data, Labelling, Bibliography, Figure, MAA, R4, Institutional review board, Elucidation, Marketing, M4, ChromeOS, Contract research organization, Mental, Impairment, Toxicokinetics, NCA, Independent, Metabolite, Drug, Risk, Metabolism, GMO, Organ, EMA, Common Technical Document, General Data Protection Regulation, Confidentiality, PPD, PI, Language, DRUG, Privacy, Result, Claimed, Medication, Comparison, Ethics, Drive, PD, Narrative, EEA, Developmental toxicity, Saccharomyces cerevisiae, Pharmacopoeia, PIP, MCB, HMA, Physical chemistry, Midol, Particle size, Council, GCP, European Economic Area, Draft, Fermentation, Overview, Justification, Control, Dicarboxylic acid, Pharmacology, WCB, Expert, Immunogenicity, Data, Study, Publication, European, ICH, Element, Analytical procedures (finance auditing), Name, Common, Guideline, Exceptional circumstances, ID, Liver, Chin Na, Toxicology, Protein primary structure, Immunosuppressive drug, Vaccine

See websites for contact details

Key Points: 
    • See websites for contact details
      Heads of Medicines Agencies www.hma.eu
      European Medicines Agency www.ema.europa.eu

      11

      Table of contents

      12

      Abbreviations .............................................................................................. 3

      13

      Definitions ................................................................................................... 4

      14

      1.

    • redaction, masking,

      68

      hiding) in such a manner that the recipient can no longer attribute the resulting information to a data

      69

      subject and make it identifiable.

    • 81

      Contract Manufacturing Organisation (CMO): shall mean an arrangement under which a

      82

      manufacturer provides upstream manufacturing services under contract on behalf of third-party

      83

      pharmaceutical companies.

    • 94

      Protected Personal Data (PPD): shall mean any personal data which should be protected from

      95

      disclosure.

    • ?Finalised? shall mean that the marketing

      102

      authorisation (MA) has been granted or refused or that the MAA has been withdrawn.

    • The application of the general principles laid down in this guidance is without prejudice to

      106

      national rules on transparency.

    • The guidance should be read in conjunction with the relevant applicable

      107

      legislation and case law on transparency and data protection.

    • 117

      This guidance document is intended to apply to information/documents on medicinal products for

      118

      human use, for which the procedure has been finalised under the national, mutual recognition,

      119

      decentralised and centralised procedures.

    • Third

      124

      parties shall be informed or consulted as needed depending on respective national and European legal

      125

      frameworks.

    • 140

      In the following sections, the agreed principles on PD and CCI are presented, including guidance on

      141

      whether such information can be disclosed.

    • EMA/131365/2024

      Page 5/50

      142

      Any information identified as PD or CCI must be subject to a preliminary review by the EMA/NCA prior

      143

      to the possible disclosure of the information/documents.

    • Principles on the protection of personal data (PD)

      145

      The protection of PD is enshrined in EU legislation; it is a fundamental right of EU citizens.

    • In

      146

      compliance with the applicable European/national legislation, PD should be anonymised in order to

      147

      avoid the disclosure of the document undermining the privacy and integrity of any individual.

    • EMA/NCA applies a risk-based approach to assess which PD elements are to be

      152

      removed from the information/documents in order to limit the risk of re-identification.

    • are included in the MAA dossier because they have a legally

      164

      defined role or responsibility and it is in the public interest to disclose this data.

    • 168

      Applicants are advised that non-essential information (e.g., personal address, personal phone number)

      169

      should not be included in the MAA dossier.

    • The

      183

      confidentiality of records that could identify subjects should be protected, respecting the privacy and

      184

      confidentiality rules in accordance with the applicable regulatory requirement(s).

    • 185

      The applicant remains responsible for compliance with the relevant legislation in cases where such data

      186

      is inadvertently included in the MAA dossier.

    • 188

      EMA/NCA applies a risk-based approach to assess which personal data elements need to be removed

      189

      from the information/documents in order to limit the risk of re-identification.

    • 194

      EMA/NCA applies a risk-based approach to assess which personal data elements need to be removed

      195

      from the information/documents in order to limit the risk of re-identification.

    • 205

      Any proposal to consider information as commercially confidential should be properly justified by the

      206

      owner of the information.

    • In this respect, any reference(s) to the risk of that interest being

      209

      undermined should be foreseeable and not purely hypothetical.

    • 210

      Information that is already in the public domain is not considered to be commercially confidential.

    • Information on the Quality and Manufacturing of medicines

      226

      A general principle regarding quality and manufacturing information is that detailed information could

      227

      be considered commercially confidential but general information should be disclosed.

    • 234

      In general, and if not in the public domain, the names of manufacturers or suppliers of the active

      235

      substance or the excipients are considered commercially confidential.

    • 248

      A general description of the type of test methods used and the appropriateness of the specification is

      249

      not commercially confidential.

    • General information on the fermentation and purification process

      259

      is not commercially confidential, although details including operating parameters and specific material

      260

      requirements are commercially confidential.

    • 273

      A general description of the type of test methods used and the appropriateness of the specification is

      274

      not commercially confidential.

    • In general, the data included in clinical trial study reports is considered to be data that can be

      283

      disclosed once PD has been anonymised.

    • 338

      In each module, a non-exhaustive list of information that may be considered protected personal data (PPD) or commercially confidential information

      332
      333

      339

      (CCI) is included.

    • ?

      Direct contact details such as telephone

      Therefore, please refer to the appropriate sub-

      number, fax number, email, postal address,

      modules hereafter for guidance.

    • ?

      Information that may reveal strategic
      (contractual) agreements

      ?

      Any quality information on the clinical batches

      principal investigator

      that might be included here (such as e.g.

    • ?

      Information that may reveal strategic
      (contractual) agreements

      principal investigator

      Study Reports
      5.3.3.3

      as the evaluation of new formulation, innovative

      number, fax number, email, postal

      Paediatric Development Plan (PIP), etc.

    • This may include taking into

      More Than One Study
      5.3.5.4

      Other Clinical Study Reports

      5.3.6

      Reports of Post-Marketing
      Experience

      5.3.7

      Direct identifiers such as name,
      signature, contact details, etc.

Transactional demand for central bank digital currency

Retrieved on: 
Thursday, April 18, 2024

Key Points: 

    Digital euro safeguards – protecting financial stability and liquidity in the banking sector

    Retrieved on: 
    Thursday, April 18, 2024

    A digital euro would offer a wide range of

    Key Points: 
      • A digital euro would offer a wide range of
        financial stability benefits, including safeguarding the role of public money and
        strengthening the strategic autonomy and monetary sovereignty of the euro area in
        the digital era.
      • Keywords: CBDC, digital euro, bank intermediation, financial stability risks.
      • A digital euro has the potential to offer a wide range of financial stability
        benefits for the digital era.
      • A digital euro would
        stimulate financial innovation among private sector entities and enhance the
        efficiency and resilience of the financial system by supporting competition and
        diversity within it.3 In addition, a digital euro would strengthen the strategic autonomy
        and monetary sovereignty of the euro area.
      • A digital euro would be designed to minimise risks to the financial system.
      • 2

        The preparation phase will pave the way for a future decision on whether or not to issue a digital euro.

      • When gauging the implications for the euro area banking sector of introducing a
        digital euro, take-up would be key, as it would determine the level of deposit
        outflows.
      • In the latter case, the
        issuance of a digital euro would not affect banks? balance sheets, since banks would return euro
        banknotes to the Eurosystem in exchange for digital euro.
      • Banknotes and digital euro are two different
        types of central bank liability, so a swap between banknotes and digital euro would only affect the
        composition and not the size of the Eurosystem?s balance sheet.
      • In our analysis, we model only the
        substitution of commercial bank deposits with a possible future digital euro.
      • 8

        The legislative proposal on a digital euro provides for the inclusion of such safeguards and establishes
        specific criteria for the limits, aiming to contain the use of a digital euro as a store of value.

      • ECB Occasional Paper Series No 346

        4

        2

        The added value of digital euro
        safeguards such as holding limits
        To understand the benefits of digital euro safeguards, such as holding limits, it
        is useful to first consider the implications of introducing a CBDC without
        adequate safeguards.

      • (2022), ?Central bank digital currency and bank intermediation: Exploring different
        approaches for assessing the effects of a digital euro on euro area banks?, Occasional Papers, No 293,
        European Central Bank, Frankfurt am Main, May.
      • deciding to adopt the digital euro, and (ii) the average amount of digital euro in a
        wallet.
      • At the same time, as discussed in this paper, the design of a digital euro would
        include effective safeguards, such as individual holding limits, to mitigate
        potential financial stability risks.
      • ECB Occasional Paper Series No 346

        15

        an upper bound on the amount of digital euro in circulation, thereby addressing and
        limiting financial stability concerns associated with the introduction of a digital euro.

      • (2023), ?A digital euro: gauging the
        financial stability implications?, Financial Stability Review, ECB, November.

    Feedback on the input provided by the European Parliament as part of its resolution on the ECB’s Annual Report 2022

    Retrieved on: 
    Thursday, April 18, 2024

    Beyond managing related risks, the financial sector can also contribute to the transition toward a net-zero economy.

    Key Points: 
    • Beyond managing related risks, the financial sector can also contribute to the transition toward a net-zero economy.
    • Our work aims to enhance data transparency in climate change analysis, while informing monetary policy, financial stability and banking supervision.
    • The indicators we have developed focus on the euro area financial sector and are built from harmonised granular datasets.