article thumbnail

Developments in Health Privacy and Cybersecurity Policy and Regulation: OCR Issues Cybersecurity Warnings and New Health Data Legislation Is Introduced

Data Matters

Proposed changes to the HIPAA Privacy Rule first announced in the fall of 2020 by the Office for Civil Rights, Department of Human and Health Services (“OCR”) may be finalized this year. The Bill is set for review for the Committee on Health, Education, Labor, and Pensions.

article thumbnail

Conversational AI use cases for enterprises

IBM Big Data Hub

AI bots provide round-the-clock service, helping to ensure that customer queries receive attention at any time, regardless of high volume or peak call times; customer service does not suffer. Marketing and sales: Conversational AI has become an invaluable tool for data collection.

Analytics 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Education In education and training , AI can tailor educational materials to each individual student’s needs. Using historical data of production, generative AI can predict or locate equipment failures in real time—and then suggest equipment adjustments, repair options or needed spare parts.

article thumbnail

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Speakers Include: Constantine Pappas – Senior Manager, Relativity Solutions, Relativity; Karen Wagshul – eDiscovery Counsel, Allstate; Kimberly Quan – Lead, eDiscovery & Information Governance, Juniper Networks; Beth Solomon – Director & Senior Counsel, Payments, Discover Financial Services.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

In particular, in a blog article entitled, The NIST Cybersecurity Framework and the FTC , dated August 31, 2016, the FTC provided guidance suggesting that the NIST Cybersecurity Framework is consistent with the agency’s approach followed since the late 1990s in over 60 law enforcement actions and in business education guidance.

article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

Threat hunters at Kaspersky said that data collected on the attack indicated that the attack was extremely targeted, and difficult to detect because “[t]he infection chain itself [did] not leave any traces on the hard drive, as its components operate[d] in memory only, thus facilitating a fileless attack with a small footprint.”