Data breaches: the financial cost of poor planning

IT Governance

Data breaches can have a wide-reaching impact. Not only can a data breach affect your organisation’s ability to fulfil its business objectives for at least a little while, but there is a significant financial cost associated with a breach of data, whether malicious or accidental.

Business Process Modeling Use Cases and Definition

erwin

It also combines process/ workflow, functional, organizational and data/resource views with underlying metrics such as costs, cycle times and responsibilities to provide a foundation for analyzing value chains, activity-based costs, bottlenecks, critical paths and inefficiencies.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

List of data breaches and cyber attacks in January 2020 – 1.5 billion records breached

IT Governance

By comparison, 2019 saw an average of almost 80 data breaches and cyber attacks per month. Several major incidents occurred in January, boosting the total number of breached records to a substantial 1,505,372,820. SuperCasino breached, with users’ personal info stolen (unknown).

The hidden threats facing your intellectual property

IT Governance

When we consider the damage a data breach can cause, we tend to focus on the cost of breach reporting, potential fines and loss of reputation. The range of threats that organisations face make it impossible to eliminate the risk of a breach.

68% of Pharma Executives Have Had Credentials Breached Online

Adam Levin

The online credentials for 68% of pharmaceutical executives analyzed for a study have been compromised recently. C-suite executives have been a frequent target for hackers and scammers, but Pierson identified some vulnerabilities specific to the pharmaceutical industry. “In

Europe’s Largest Private Hospital Operator Fresenius Hit by Ransomware

Krebs on Security

The reader said the apparent culprit was the Snake ransomware , a relatively new strain first detailed earlier this year that is being used to shake down large businesses, holding their IT systems and data hostage in exchange for payment in a digital currency such as bitcoin.

The Applications of Blockchain in Data Management

AIIM

The blocks also contain a timestamp and transactional data. 5 Benefits of Blockchain for Data Management. In my work at Mustard IT , many of our data management projects for our clients have involved the use of blockchain. Data Security. Data Quality. Data Sharing.

New Data Protection-Friendly eCommercial Model Clinical Trial Agreements Now Available

HL Chronicle of Data Protection

Given the increasing importance of safe but swift clinical trials in the time of coronavirus, this post outlines the main changes introduced from a data protection perspective and what they mean for contracting parties. With respect to the data sharing under Clause 6.3,

Information security and compliance training for the healthcare sector

IT Governance

Healthcare is one of the hardest-hit industries when it comes to data breaches. Healthcare providers (HCPs) and industry partners process significant amounts of data which that is both attractive and valuable to cyber criminals.

Security in a World of Physically Capable Computers

Schneier on Security

The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. We have accepted this tenuous situation because, for a very long time, computer security has mostly been about data.

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Determine what data is covered by the CCPA. However, even organizations that do not qualify as a “business” may nonetheless need to evaluate their data sharing arrangements and partnerships with CCPA-covered entities. Is the data PHI? Is the data medical information?

CNIL Unveils 2017 Inspection Program and 2016 Annual Activity Report

Hunton Privacy

On March 28, 2017, the French Data Protection Authority (“CNIL”) published its Annual Activity Report for 2016 (the “Report”) and released its annual inspection program for 2017. The CNIL estimates that the GDPR will lead to the appointment of a data protection officer in at least 80,000 to 100,000 organizations in France. European Union International CNIL Consent Data Protection Authority EU Regulation France Internet Legislation Personal Data Right to Be Forgotten

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Determine what data is covered by the CCPA. However, even organizations that do not qualify as a “business” may nonetheless need to evaluate their data sharing arrangements and partnerships with CCPA-covered entities. Is the data PHI? Is the data medical information?

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Determine what data is covered by the CCPA. However, even organizations that do not qualify as a “business” may nonetheless need to evaluate their data sharing arrangements and partnerships with CCPA-covered entities. Is the data PHI? Is the data medical information?

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. Among other news: B&Q breached the personal data of 70,000 people who had been caught stealing products from its stores.

CIPL and AvePoint Release Global GDPR Readiness Report

Hunton Privacy

On November 9, 2016, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP and AvePoint released the results of a joint global survey launched in May 2016 concerning organizational preparedness for implementing the EU General Data Protection Regulation (“GDPR”). Telecommunication and technology companies were the most represented respondents, followed by insurance and financial services companies, as well as pharmaceutical and healthcare companies.

July 9 – 13, 2019

InfoGovNuggets

“ Schools Wrestle With Privacy of Digital Data Collected on Students ,” The Wall Street Journal , July 11, 2019 (online). Who owns the data, and what rules govern? “ Marriott Faces $124 Million Fine Over Starwood Data Breach ,” The Wall Street Journal , July 10, 2019 (online). District Court judge says Health and Human Services didn’t have the authority to require pharmaceutical companies to publish these prices.

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

On May 28, 2019, the Cyberspace Administration of China (“ CAC “) released the draft Measures on the Administration of Data Security (“ Data Security Measures ” see our in-house English translation here ) for public consultation. The scope of application of the Data Security Measures. The data covered by the Data Security Measures includes personal data and important data. Filing of personal data collection statements.