2. Transparent and explainable AI
We will be explicit about the kind of personal and or non personal data the AI systems uses as well as about the purpose the data is used for.
4. Privacy and security by design
privacy and security by design
4. Privacy and security by design
AI systems are fuelled by data, and Telefónica is committed to respecting people’s right to privacy and their personal data.
4. Privacy and security by design
AI systems are fuelled by data, and Telefónica is committed to respecting people’s right to privacy and their personal data.
4. Privacy and security by design
When processing personal data, according to Telefónica’s privacy policy, we will at all times comply with the principles of lawfulness, fairness and transparency, data minimisation, accuracy, storage limitation, integrity and confidentiality.
4. Privacy and security by design
When processing personal data, according to Telefónica’s privacy policy, we will at all times comply with the principles of lawfulness, fairness and transparency, data minimisation, accuracy, storage limitation, integrity and confidentiality.
4. Privacy and security by design
In order to ensure compliance with our privacy Policy we use a privacy by Design methodology.
4. Privacy and security by design
In order to ensure compliance with our privacy Policy we use a privacy by Design methodology.
4. Privacy and security by design
We apply, according to Telefónica’s privacy policy, in all of the processing cycle phases, the technical and organizational measures required to guarantee a level of security adequate to the risk to which the personal information may be exposed and, in any case, in accordance with the security measures established in the law in force in each of the countries and or regions in which we operate.
4. Privacy and security by design
We apply, according to Telefónica’s privacy policy, in all of the processing cycle phases, the technical and organizational measures required to guarantee a level of security adequate to the risk to which the personal information may be exposed and, in any case, in accordance with the security measures established in the law in force in each of the countries and or regions in which we operate.