Compliance (regulatory compliance) means conforming to comply with relevant laws and regulations. Together with KYC Spider in Zug Eurospider has in-depth compliance know-how.

Machine learning is widely used in computer science and other fields such as compliance. Developing successful machine learning applications, however, requires a substantial amount of "black art" that is difficult to find in textbooks. Here come the 12 key lessons that machine learning researches have learned.

In a previous post, it was suggested that smart technologies should be used to resolve data protection issues rather than comprehensive legal measures. The current COVID-19 crisis appears to be reinforcing the use of the former. Co-developed with Swiss expertise, the DP3T protocol forms the foundation of Apple and Google’s API, which will assist with developing contact tracing apps in future.

Coronavirus (COVID-19) is currently dominating news coverage in the media. One of the most popular questions is when the number of infections will reach their peak. Virologists have been creating models, authorities making predictions, and even public figures, who are themselves not specialists, have been posing as experts. Eurospider switched its “Compliance Machine” from adverse media to COVID-19 and searched for opinions in the media about when the pandemic will reach its peak.

It’s a familiar scenario. You need to print something in a hurry, but the printer isn’t working – and neither is the ticket machine. And the train is has come to a halt somewhere along the tracks, probably due to a software bug. Unfortunately, we still haven’t found a way to get rid of these critters once and for all. In 1977, Caspers Jones estimated that for every 1,000 lines of code, one can expect a specific number of bugs that cause incorrect results or unexpected behaviors in computer programs. So from a compliance point of view, bugs are always to be expected. What does this mean?

White and black lists, also called positive and negative lists, are used for binary categorizations. Examples are spam filters against unwanted e-mails, but also proscription lists in the Roman Empire with the names of unpopular political opponents to be murdered. More recent are the lists published by the American President George Bush after the terrorist attacks on September 11, 2001. White and black lists can be combined in different ways: All positives but without negatives and all negatives but without the positives. In compliance, whitelisting is often used when periodically checking a customer base.

Complete Revision of the Federal Data Protection Act

The complete revision's draft of the Federal Data Protection Act is currently in political consultation. Data Protection is to be increased by giving people more control over their private data as well as reinforcing transparancy regarding the handling of confidential data.

Links: draft, report

Eurospider Information Technology AG
Winterthurerstrasse 92
8006 Zürich


Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok Decline