article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

For example, the consulting company Mckinsey found that the usage of telehealth has grown 38 times if compared to the usage before the pandemic. The risks of non-compliance. The digitalization of the healthcare. The healthcare and life science industries embrace of digitalization has been all-encompassing.

article thumbnail

The Value of Data Governance and How to Quantify It

erwin

For example, one global pharmaceutical giant reduced cost by 70 percent and generated 95 percent of production code with “zero touch.” Risk Management and Regulatory Compliance. Risk management, specifically around regulatory compliance, is an important use case to demonstrate the true value of data governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Cybersecurity Directives (NIS2 and CER) Enter into Force

Hunton Privacy

For example, the concept of “essential entities” replaces “operators of essential services”; it is likely that most organizations classified as “operators of essential services” under the original NIS Directive will be classified as “essential entities” under the NIS2 Directive. For important entities, of at least up to €7 million or 1.4%

article thumbnail

Enterprise Architect: A Role That Keeps Evolving

erwin

If, for example, a business sets a goal to increase its website sales by 20 percent in one year’s time, meeting that goal will require that different IT and business functions work together. One team member might specialize in security, for example, and another in applications.

article thumbnail

The Belgian Data Protection Authority Publishes Recommendation Concerning Data Processing for Direct Marketing Purposes

HL Chronicle of Data Protection

Some relevant examples include, but are not limited to: Companies sending emails to clients mentioned in their listing; NGOs delivering mail to a list of subscribers to inform them on a new campaign; and. The Recommendation provides a step-by-step approach on how achieve compliance: 1. How to Comply?

article thumbnail

Learn. Transform. Advance.

erwin

The best example I can point to, which underscores the importance and relevance of data, is pharmaceutical companies that have been working at unprecedented speed to develop not only effective treatments for the coronavirus but also vaccines. Confront new compliance challenges as a result of the changes you had to institute?

article thumbnail

EU: NIS2 enters into force

DLA Piper Privacy Matters

Management bodies of essential and important entities will have to approve these cybersecurity risk management measures, supervise their implementation and be liable for non-compliance by the entity. NIS2 replaces this categorisation with ‘essential’ entities and ‘important’ entities – based on the sector and size of the operators.