Biometric data often includes a person’s retina scans, facial geometry, or these unique patterns on one's digits.
What are fingerprints?
Assuming Langdon Winner were a guest speaker, he'd have argued that Artifacts have this.
What are politics?
GDPR
What is the General Data Protection Regulation?
When an unauthorized person hacks into a system and obtains data, it’s known as a data this.
What is a data breach?
Winner argues some technologies are “inherently political” because they require a particular form of social ________.
What is order?
These AI models, trained on massive text corpora, rely on probability distributions to predict the next most likely word or token.
What are large language models (LLMs)?
Carolyn Krol, who spoke about counseling on AI research, currently works at this tech company and previously worked at Meta.
What is Google?
CFPB
What is the Consumer Financial Protection Bureau?
Malicious software designed to damage or disrupt computer systems is commonly called this.
What is malware?
In Winner’s most famous example-story, low overpasses are said to block this vehicle type from reaching certain beaches.
What are buses?
One concern with generative AI is its ability to create realistic but fabricated audio or video—commonly referred to by this portmanteau.
What is a “deepfake”?
The Managing Director of IAPP DC, who joined us virtually for a discussion on all things FTC, consumer protection, and digital governance.
Who is Cobun Zweifel-Keegan?
COPPA
What is the Children's Online Privacy Protection Act?
This process scrambles data so only those with the proper key can read it.
What is encryption?
Winner points to this energy technology as tending toward centralized control and security regimes.
What is nuclear power?
In privacy enforcement, the FTC and FCC can order companies to pay monetary penalties or sign these legally binding agreements if they mishandle user data.
What are consent decrees?
FTC representative Danica Noble also has an affiliation with this UW center dedicated to combating misinformation.
What is the UW Center for an Informed Public?
FOIA
What is the Freedom of Information Act?
A system that monitors and blocks suspicious incoming traffic can be referred to by this fortress-related name.
What is a firewall?
Bowker and Star's book "Sorting Things Out" opens with the argument that this fundamental human cognitive activity — grouping things into types — is inherently political.
What is classification?
The fall Testimony Practicum had you watch actual committee proceedings on this Washington State public affairs television network.
What is TVW?
Representative Shelley Kloba of the Washington State House of Representatives, who joined us for a conversation on privacy lawmaking, represents this Legislative District.
What is District 1?
UDAP
What are Unfair and Deceptive Acts or Practices?
This security method requires users to verify their identity using two or more different types of evidence—such as a password plus a code sent to their phone—before gaining access to an account.
What is multi-factor authentication?
This phrase, from Gitelman and Jackson, reminds us that data are never truly neutral or unmediated.
What is “Raw data is an oxymoron”?