Technology ❯ Information Security ❯ Data Privacy ❯ Confidentiality Agreements
Leaked rules point to a secrecy-focused trial using disguised prototypes to gather real-world feedback.