Remove Document Remove Encryption Remove Healthcare Remove Personal data
article thumbnail

New Cybersecurity Directives (NIS2 and CER) Enter into Force

Hunton Privacy

However, the concept of an “essential entity” is much broader and will also capture many organizations that have, to-date, not been subject to the NIS regime—for example, pharmaceutical companies and operators of hydrogen production, storage and transmission. Reporting of incidents.

article thumbnail

List of Data Breaches and Cyber Attacks in April 2023 – 4.3 Million Records Breached

IT Governance

Shields Health Care Group The largest data breach of April 2023 was at the Shields Health Care Group, a Massachusetts-based medical services provider. Reports emerged near the end of the month that a cyber criminal had gained unauthorised access to the organisation’s systems and had stolen the personal data of 2.3

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

The penalty, which was by far the biggest GDPR fine in the eight months that the Regulation had been in effect, related to two violations: Google had failed to adequately explain to its users why it was collecting their data, and it didn’t document a legal basis for doing so. Mumsnet disclosed a data breach affecting 4,000 people.

article thumbnail

The Applications of Blockchain in Data Management

AIIM

Let's take a look at what the use of blockchain can do for your data management. Data Security. Given the high number of data breaches in recent years, we all have good reason to be concerned about the misuse of our personal data. This included the credit card details of over 200 thousand people.