Remove Healthcare Remove Manufacturing Remove Meeting Remove Training
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

In the NIS Directive, the obligations that apply to an entity that falls under the scope of the NIS Directive depend on its qualification as ‘operator of essential services’ (“OES”) or ‘digital service provider’ (“DSP”): An OES is defined as a public or private entity of a type referred to in Annex II, which meets certain criteria.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Van Norman: industrial control systems are the systems that every industry is going to use from your manufacturing to your chemical, your food and beverage, your power plants. That's where you know, your water plants come in, that's where your chemicals, your oil and gas, your big manufacturing facilities. Van Norman: Right right.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anonymization & Pseudonymization as Tools for Cross-Border Discovery Compliance

ARMA International

For example, Recital 28(1) provides: “The application of pseudonymisation to personal data can reduce the risks to the data subjects concerned and help controllers and processors to meet their data-protection obligations.”. For example, consider the hypothetical case of Class Action Plaintiffs vs. ABC Pharmaceutical Company.

article thumbnail

IG: The Whole Is More Than the Sum of Its Parts

Positively RIM

Specialists in finance, operations, compliance, legal matters, and others are highly trained in their disciplines. However, their training rarely includes information technology, managing Big Data, and system optimization. Conversely, technology specialists rarely train on the intricacies of law, compliance and privacy.

IT 40