Remove Article Remove Examples Remove Healthcare Remove Security
article thumbnail

New Data Protection-Friendly eCommercial Model Clinical Trial Agreements Now Available

HL Chronicle of Data Protection

The mCTA and CRO-mCTA have been generally updated to reflect the new data protection legislation (GDPR and DPA), by including provisions on sharing coded data, security, and data breaches. incorporating an Article 28 GDPR-compliant data processing agreement between the sponsor (controller) and the Participant Organisation (processor).

GDPR 90
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

On May 28, 2019, the Cyberspace Administration of China (“ CAC “) released the draft Measures on the Administration of Data Security (“ Data Security Measures ” see our in-house English translation here ) for public consultation. The scope of application of the Data Security Measures.

article thumbnail

How does GDPR impact digital preservation solutions in the Cloud?

Preservica

The GDPR article 28 states controllers "shall use only processors providing sufficient guarantees to (.) It’s important to note that transfers outside of the EU are allowed but you should pay careful attention to how your processor meets the transfer obligations of articles 44-46. First of all, the cloud. Now to digital preservation.

article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

At present, litigation of this type has typically failed at the pleadings stage due to plaintiffs’ failure to demonstrate the “injury in fact” necessary for Article III standing. A number of countries are suggesting data localization as a way to secure their systems, which would mean significant changes for companies operating there.

article thumbnail

Business of Data – issue 6

Information Matters

” [link] journals/lancet/article/ PIIS0140-6736(18)32942-8/ fulltext. They also have a long history of being at the forefront of security methods, from the development of the vault to multi-factor authentication. ” [link] security/32428/data- aggregator-leaks-93m-people-s- personal-information. Follow the Data?

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

California law also requires businesses that suffer a breach of security to disclose the breach to consumers, and in some instances law enforcement, if sensitive information is compromised. race, religion, sexual orientation, gender identity, gender expression, age, etc.);

Privacy 58