article thumbnail

Optimizing clinical trial site performance: A focus on three AI capabilities

IBM Big Data Hub

This article, part of the IBM and Pfizer’s series on the application of AI techniques to improve clinical trial performance, focuses on enrollment and real-time forecasting. The ability to seize these advantages is one way that pharmaceutical companies may be able to gain sizable competitive edge.

article thumbnail

The Belgian Data Protection Authority Publishes Recommendation Concerning Data Processing for Direct Marketing Purposes

HL Chronicle of Data Protection

Political parties inviting their contacts to participate in political events. The Belgian DPA advises all those engaging in direct marketing to clearly define their processing purposes, in order to ensure that they have a legal basis for pursuing processing as required under Article 6 of the GDPR. How to Comply?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Article 29 Working Party Issues Guidance on European Patients Smart Open Services

Hunton Privacy

On January 25, 2012, the Article 29 Working Party (the “Working Party”) issued a Working Document providing guidance on data protection issues relating to the European Patients Smart Open Services (“epSOS”) project.

article thumbnail

CIPL Co-Hosts Workshop on GDPR and Scientific Health Research

Hunton Privacy

the “Workshop”) with the European Federation of Pharmaceutical Industries and Associations (“EFPIA”) and the Future of Privacy Forum (“FPF”) to address the challenges raised by the EU General Data Protection Regulation (“GDPR”) in conducting scientific health research.

GDPR 54
article thumbnail

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

Article 2 of the draft Data Security Measures states that the provisions therein govern all sector data processing activities (including, but not limited to, data collection, retention, transfer, and processing and use), that use cyber technologies within the territory of the People’s Republic of China.

article thumbnail

Revealing the Invisible

AIIM

In guiding and prepping the event partners and educators, I revisited an article that AIIM21 keynote speaker, Tom Koulopoulos wrote six years ago. Here's a picture of him from that event: In the article, Tom offers five predictions for business and technology in the twenty years hence.

Education 116
article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

At present, litigation of this type has typically failed at the pleadings stage due to plaintiffs’ failure to demonstrate the “injury in fact” necessary for Article III standing. In any event, betting against federal data breach legislation has been the right call every year since California adopted the first state notification law in 2003.