Remove tag location-based-services
article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

The claims related to the company’s sharing personal data without consumer consent and making it very difficult for consumers to cancel their subscriptions to this telehealth service. The order also requires that the company destroy personal data for which it had not received consent and to create a document retention and destruction policy.

article thumbnail

Keeping Up with New Data Protection Regulations

erwin

Some industries, such as healthcare and financial services, have been subject to stringent data regulations for years: GDPR now joins the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS) and the Basel Committee on Banking Supervision (BCBS). employees).

GDPR 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Customer-facing AI use cases Deliver superior customer service Customers can now be assisted in real time with conversational AI. Voice-based queries use natural language processing (NLP) and sentiment analysis for speech recognition so their conversations can begin immediately.

article thumbnail

Everteam.iFile | Connect, Extract, Process, Manage and Analyze all your Stored Information

Everteam

To efficiently manage data, Everteam developed everteam.iFile, a solution based on Artificial Intelligence and Machine Learning to find, identify, manage and process information regardless of its location. Users will be able then to add public and private comments and control the access to the iFile based on pre-defined roles.

article thumbnail

From the CTO: From Information Governance to Information Asset Management

Everteam

You would be able to see this information regardless of where the asset is located: from within your CRM, your SharePoint site, your Line of Business application, and so on. Most approaches currently are based on a bottom-up approach, focused on applying some risk labels (e.g. Augmenting Information Assets Users Access.