Remove Examples Remove Insurance Remove Manufacturing Remove Webinar
article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Four

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. SPECIFIC EXAMPLES. Since this could be years after the product was brought to market, the manufacturer and/or distributor may be responsible for an extended period of time for product defects of various types.

IT 31
article thumbnail

OCR Provides Insight into Enforcement Priorities and Breach Trends

HL Chronicle of Data Protection

Regulators, industry experts, and researchers provided insight into health privacy and security enforcement trends, emerging threats, and new tools at a recent conference focused on the Health Insurance Portability and Accountability (HIPAA) regulatory framework. HHS Security Risk Assessment Tool.

Risk 40
article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

This type of threat poses interesting questions on the design of systems that have long life cycles – for example cars, transport infrastructure, core banking applications, and blockchain applications. to initiate malicious transactions on long term blockchains or distributed ledgers. How can Thales and IBM Consulting help you?

Risk 87