Remove Communications Remove Examples Remove Government Remove Healthcare
article thumbnail

Pharmaceutical companies exploited by phishing scam targeting job seekers

IT Governance

Earlier this month, two major pharmaceutical giants issued warnings about phishing emails targeting job hunters. Unfortunately, red flags like that are ignored in all kinds of phishing scams, and this scheme is a perfect example of why that happens. Does this seem consistent with previous communications?

article thumbnail

The Value of Data Governance and How to Quantify It

erwin

erwin recently hosted the second in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities. Led by Frank Pörschmann of iDIGMA GmbH, an IT industry veteran and data governance strategist, the second webinar focused on “ The Value of Data Governance & How to Quantify It.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The benefits of AI in healthcare

IBM Big Data Hub

Artificial intelligence is used in healthcare for everything from answering patient questions to assisting with surgeries and developing new pharmaceuticals, benefitting both patients and healthcare systems. For example, doctors and other clinicians can dictate notes hands-free, giving them more face-to-face time with patients.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

That list corresponds to the list of OES under the NIS Directive, supplemented with the following entities: additional entities in the energy sector , adding for example district heating and cooling and operators of hydrogen production, storage and transmission. However, certain types of small and micro entities are nonetheless covered.

article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

In Carpenter , the government obtained months’ worth of a suspect’s cell phone location records pursuant to the Stored Communications Act (SCA). Carpenter argues that the government is required to receive a warrant under the Fourth Amendment for his location records. The Internet of Bodies.

article thumbnail

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

For example, a non-profit research institution that is controlled by a for-profit business and shares common branding or a non-profit charitable subsidiary of a for-profit parent company may be subject to the CCPA. Instead, the CCPA expressly exempts PHI collected by a Covered Entity or Business Associate that is governed by HIPAA.

Privacy 45
article thumbnail

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

For example, a non-profit research institution that is controlled by a for-profit business and shares common branding or a non-profit charitable subsidiary of a for-profit parent company may be subject to the CCPA. Instead, the CCPA expressly exempts PHI collected by a Covered Entity or Business Associate that is governed by HIPAA.

Privacy 40