third parties

Apple Find My can now share AirTag locations with airlines and third parties

Apple has launched a beta feature called Share Item Location in iOS 18.2, allowing users to share the location of an AirTag or Find My network accessory with third parties. This update is designed to simplify the process of locating misplaced items, particularly when traveling. Users can generate a secure link in the Find My app on their iPhone, iPad, or Mac, which can then be shared. The recipient can access an interactive map that shows the item’s location and updates automatically. The shared link expires after seven days or when the item is recovered, maintaining privacy and security. “Find… [Continue Reading]




third parties

Comp Settlement Doesn't Preclude Civil Suit Against Third Parties

The Georgia Court of Appeals ruled that a worker’s settlement of his compensation claim against his employer did not preclude him from pursuing a civil suit against alleged third-party tortfeasors…




third parties

Engagement with third parties seen as the greatest anti-corruption risk

A new report from global law firm White & Case LLP and the Risk & Compliance Advisory practice of KPMG LLP reveals the current state of compliance on key issues across industries, geographies, and organisational sizes. 




third parties

Elon Musk’s X is changing its privacy policy to allow third parties to train AI on your posts

On Wednesday, social network X (formerly Twitter) updated its Privacy Policy to indicate that it would allow third-party “collaborators” to train their AI models on X data, unless users opt out. While X owner Elon Musk trained xAI’s Grok AI chatbot on X user data, leading to an investigation by the EU’s lead privacy regulator, […]

© 2024 TechCrunch. All rights reserved. For personal use only.




third parties

Protecting your IP when contracting with third parties – IP development and exploitation agreements – webinar

In this webinar for education institutions we will consider: - contract principles - early questions to consider: • what is the purpose of collaboration? • what IP may be generated? • who owns background IP? ...