SlideShare a Scribd company logo
Big Data and Cyber
Security Legal Risks and
Challenges
KAPIL MEHROTRA
DATE : 17/11/2016
What Is Big Data?
Extremely large data sets that may be analysed to reveal patterns, trends, and associations, especially relating
to human behaviour and interactions.
Technology has touched every aspect of our lives, be it using Google Maps, Skype, What's Up, Facebook,
Twitter, Email, Smart Phones, Smart Devices, IOT devices, Credit/Debit cards etc.
And amidst all the benefits that technology has delivered, lies our personally identifiable information (PII).
Big Data In Healthcare ?
The medical industry already collects a huge amount of data through individual doctors, hospitals, and clinics.
Unifying that data — and combining it with patient-collected data from smart devices(wearables, BP, Glucose
monitoring etc) is the end objective of next level of patient care.
Sample Data Captured in all the healthcare :
Name
DOB
Home addresses
Phone number
Email IDs
Family History
Insurance details
Personal ID details
Vitals
Medical history
Conditions/disease
LAB Tests
Emergency contacts
Credit/debit card information
Billing Details
Visit Details
WHY HEALTHCARE INFORMATION IS IN HIGH DEMAND BY CYBERCRIMINALS?
Data can be used to launch Email Scams, Identity Theft, & Social Media Frauds.
• Cyberattacks on healthcare industry have increased.
• 100 million healthcare records were compromised in 2015
• 2015 “The YEAR OF THE HEALTHCARE HACK”.
• 88%of all ransomware is detected in the healthcare industry.
• The estimated cost of a major healthcare breach is $200 per-patient record.
Data Breaches Are Costing The Healthcare Industry approximately $6 Billion Annually
(IT’s Including FINES, PENALTIES, LAWSUITS, and DATA RECOVERY COSTS)
Top 5 Threats in Healthcare
1. Ransomware :
(lot of phishing emails contain ransomware.)
2. Insiders :
Co-workers
Unauthorized physician access
Bad security hygiene
Misuse of systems
3. Advanced Persistent Threats (APT)
Credit/Debit Card Information.
4. Mobile Devices
Lost/Stolen Device
5. Employee Negligence
Using infected USB Drive
Visiting Infected Website
Malicious AD
Phishing Emails.
Legal Risks & Challenges
The risks associated with any attack depend on three factors:
1. Threats (who is attacking)
2. Vulnerabilities (the weaknesses they are attacking)
3. Impacts (what the attack does)
Legal Risks & Challenges
1. Monitoring Data :
(Leads to Privacy & Regulatory actions)
2. Sharing Details :
(Leads to Privacy & Regulatory actions)
3. Data rights and ownership
(Challenge)
4. Protecting sensitive and personal information
(Challenge)
Thank You

More Related Content

What's hot

Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Patton Boggs LLP
 
EMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionEMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionCodal
 
Health web sites and different health apps 31.12.2020
Health web sites and different health apps 31.12.2020Health web sites and different health apps 31.12.2020
Health web sites and different health apps 31.12.2020Shazia Iqbal
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyCheapSSLsecurity
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA BreachInfinisource
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsSpok
 
Ransomware Attacks on Medical Devices on the Rise
Ransomware Attacks on Medical Devices on the RiseRansomware Attacks on Medical Devices on the Rise
Ransomware Attacks on Medical Devices on the RiseEMMAIntl
 
Ivanti Threat Thursday for September 26th
Ivanti Threat Thursday for September 26thIvanti Threat Thursday for September 26th
Ivanti Threat Thursday for September 26thIvanti
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Brian Dickerson
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateRedspin, Inc.
 
HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesRedspin, Inc.
 
RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™CPaschal
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research PaperRyan Flanagan
 
Risk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare InformationRisk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare InformationHal Amens
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non complianceAegify Inc.
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare OrganizationsAvePoint
 
The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...CureMD
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowShred-it
 

What's hot (20)

Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...
 
EMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionEMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective Solution
 
Health web sites and different health apps 31.12.2020
Health web sites and different health apps 31.12.2020Health web sites and different health apps 31.12.2020
Health web sites and different health apps 31.12.2020
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Ransomware Attacks on Medical Devices on the Rise
Ransomware Attacks on Medical Devices on the RiseRansomware Attacks on Medical Devices on the Rise
Ransomware Attacks on Medical Devices on the Rise
 
Ivanti Threat Thursday for September 26th
Ivanti Threat Thursday for September 26thIvanti Threat Thursday for September 26th
Ivanti Threat Thursday for September 26th
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
 
HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business Associates
 
RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research Paper
 
Risk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare InformationRisk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare Information
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 

Viewers also liked

Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for securityJames Salter
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Digital Etiquette vhardy
Digital Etiquette  vhardyDigital Etiquette  vhardy
Digital Etiquette vhardyVanessa Hardy
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Spacekirahlee
 
Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital StorySandra Sammarco
 
Providing Proofs of Past Data Possession in Cloud Forensics
Providing Proofs of Past Data Possession in Cloud Forensics Providing Proofs of Past Data Possession in Cloud Forensics
Providing Proofs of Past Data Possession in Cloud Forensics zawoad
 
NGN Japan 2012-2017
NGN Japan 2012-2017NGN Japan 2012-2017
NGN Japan 2012-2017Kabir Ahmad
 
Delivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsDelivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsCloudPassage
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineSalshaza Putera
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Eftychia Chalvatzi
 
MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015Ludvic Baquie
 
Big data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilotsBig data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilotsBigData_Europe
 
VO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomyVO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomyJoint ALMA Observatory
 
modern security risks for big data and mobile applications
modern security risks for big data and mobile applicationsmodern security risks for big data and mobile applications
modern security risks for big data and mobile applicationsTrivadis
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 

Viewers also liked (20)

Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Malware
MalwareMalware
Malware
 
Digital Etiquette vhardy
Digital Etiquette  vhardyDigital Etiquette  vhardy
Digital Etiquette vhardy
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
 
Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital Story
 
Providing Proofs of Past Data Possession in Cloud Forensics
Providing Proofs of Past Data Possession in Cloud Forensics Providing Proofs of Past Data Possession in Cloud Forensics
Providing Proofs of Past Data Possession in Cloud Forensics
 
NGN Japan 2012-2017
NGN Japan 2012-2017NGN Japan 2012-2017
NGN Japan 2012-2017
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
 
Delivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsDelivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS Products
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...
 
MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
 
Big data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilotsBig data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilots
 
VO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomyVO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomy
 
modern security risks for big data and mobile applications
modern security risks for big data and mobile applicationsmodern security risks for big data and mobile applications
modern security risks for big data and mobile applications
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 

Similar to Big data and cyber security legal risks and challenges

Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxperryk1
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Protected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor
 
2022 APIsecure_Raw and Unbridled Truth: Healthcare APIs
2022 APIsecure_Raw and Unbridled Truth: Healthcare APIs2022 APIsecure_Raw and Unbridled Truth: Healthcare APIs
2022 APIsecure_Raw and Unbridled Truth: Healthcare APIsAPIsecure_ Official
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthcSilvaGraf83
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthcMoseStaton39
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxMarket iT
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...ijsptm
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected? Mark Merrill
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftOPSWAT
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Panda Security
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat PrognosisFireEye, Inc.
 
Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin, Inc.
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
2022-02-17-1300-emr-in-healthcare-tlpwhite.pdf
2022-02-17-1300-emr-in-healthcare-tlpwhite.pdf2022-02-17-1300-emr-in-healthcare-tlpwhite.pdf
2022-02-17-1300-emr-in-healthcare-tlpwhite.pdfMOHAMMED YASER HUSSAIN
 
Healthcare Thinktank Roundtable
Healthcare Thinktank RoundtableHealthcare Thinktank Roundtable
Healthcare Thinktank RoundtableNick van Terheyden
 

Similar to Big data and cyber security legal risks and challenges (20)

Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Protected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend Report
 
2022 APIsecure_Raw and Unbridled Truth: Healthcare APIs
2022 APIsecure_Raw and Unbridled Truth: Healthcare APIs2022 APIsecure_Raw and Unbridled Truth: Healthcare APIs
2022 APIsecure_Raw and Unbridled Truth: Healthcare APIs
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicaux
 
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security
 
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
2022-02-17-1300-emr-in-healthcare-tlpwhite.pdf
2022-02-17-1300-emr-in-healthcare-tlpwhite.pdf2022-02-17-1300-emr-in-healthcare-tlpwhite.pdf
2022-02-17-1300-emr-in-healthcare-tlpwhite.pdf
 
Healthcare Thinktank Roundtable
Healthcare Thinktank RoundtableHealthcare Thinktank Roundtable
Healthcare Thinktank Roundtable
 

Recently uploaded

CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdfCHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdfSachin Sharma
 
Sugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdf
Sugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdfSugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdf
Sugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdfDharma Homoeopathy
 
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...aunty1x1
 
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...rajkumar669520
 
Best Erectile Dysfunction Treatment In Narela
Best Erectile Dysfunction Treatment In NarelaBest Erectile Dysfunction Treatment In Narela
Best Erectile Dysfunction Treatment In NarelaLalClinic
 
#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...
#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...
#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...aunty1x1
 
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxAnushriSrivastav
 
Overcome Your Phobias with Hypnotherapy.pptx
Overcome Your Phobias with Hypnotherapy.pptxOvercome Your Phobias with Hypnotherapy.pptx
Overcome Your Phobias with Hypnotherapy.pptxrenewlifehypnosis
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cell
 
GENERAL PHARMACOLOGY - INTRODUCTION DENTAL.ppt
GENERAL PHARMACOLOGY - INTRODUCTION DENTAL.pptGENERAL PHARMACOLOGY - INTRODUCTION DENTAL.ppt
GENERAL PHARMACOLOGY - INTRODUCTION DENTAL.pptMangaiarkkarasi
 
Storage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptxStorage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptxBariquins
 
Breaking Down Oppositional Defiant Disorder Treatments
Breaking Down Oppositional Defiant Disorder TreatmentsBreaking Down Oppositional Defiant Disorder Treatments
Breaking Down Oppositional Defiant Disorder TreatmentsOppositional Defiant Disorder
 
Antibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAntibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAnushriSrivastav
 
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...aunty1x2
 
Urinary Elimination BY ANUSHRI SRIVASTAVA.pptx
Urinary Elimination BY ANUSHRI SRIVASTAVA.pptxUrinary Elimination BY ANUSHRI SRIVASTAVA.pptx
Urinary Elimination BY ANUSHRI SRIVASTAVA.pptxAnushriSrivastav
 
Enhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdfEnhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdfgajendrasinh1303
 
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...aunty1x1
 
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...ananyagirishbabu1
 
Myopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptxMyopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptxRitonDeb1
 

Recently uploaded (20)

CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdfCHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
 
Sugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdf
Sugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdfSugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdf
Sugar Medicine_ Natural Homeopathy Remedies for Blood Sugar Management.pdf
 
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
 
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 
Best Erectile Dysfunction Treatment In Narela
Best Erectile Dysfunction Treatment In NarelaBest Erectile Dysfunction Treatment In Narela
Best Erectile Dysfunction Treatment In Narela
 
#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...
#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...
#cALL# #gIRLS# In Chhattisgarh ꧁❤8901183002❤꧂#cALL# #gIRLS# Service In Chhatt...
 
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
 
Overcome Your Phobias with Hypnotherapy.pptx
Overcome Your Phobias with Hypnotherapy.pptxOvercome Your Phobias with Hypnotherapy.pptx
Overcome Your Phobias with Hypnotherapy.pptx
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
 
GENERAL PHARMACOLOGY - INTRODUCTION DENTAL.ppt
GENERAL PHARMACOLOGY - INTRODUCTION DENTAL.pptGENERAL PHARMACOLOGY - INTRODUCTION DENTAL.ppt
GENERAL PHARMACOLOGY - INTRODUCTION DENTAL.ppt
 
Storage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptxStorage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptx
 
Breaking Down Oppositional Defiant Disorder Treatments
Breaking Down Oppositional Defiant Disorder TreatmentsBreaking Down Oppositional Defiant Disorder Treatments
Breaking Down Oppositional Defiant Disorder Treatments
 
Antibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAntibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptx
 
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
 
Urinary Elimination BY ANUSHRI SRIVASTAVA.pptx
Urinary Elimination BY ANUSHRI SRIVASTAVA.pptxUrinary Elimination BY ANUSHRI SRIVASTAVA.pptx
Urinary Elimination BY ANUSHRI SRIVASTAVA.pptx
 
Enhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdfEnhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdf
 
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
 
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
 
Myopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptxMyopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptx
 

Big data and cyber security legal risks and challenges

  • 1. Big Data and Cyber Security Legal Risks and Challenges KAPIL MEHROTRA DATE : 17/11/2016
  • 2. What Is Big Data? Extremely large data sets that may be analysed to reveal patterns, trends, and associations, especially relating to human behaviour and interactions. Technology has touched every aspect of our lives, be it using Google Maps, Skype, What's Up, Facebook, Twitter, Email, Smart Phones, Smart Devices, IOT devices, Credit/Debit cards etc. And amidst all the benefits that technology has delivered, lies our personally identifiable information (PII).
  • 3. Big Data In Healthcare ? The medical industry already collects a huge amount of data through individual doctors, hospitals, and clinics. Unifying that data — and combining it with patient-collected data from smart devices(wearables, BP, Glucose monitoring etc) is the end objective of next level of patient care. Sample Data Captured in all the healthcare : Name DOB Home addresses Phone number Email IDs Family History Insurance details Personal ID details Vitals Medical history Conditions/disease LAB Tests Emergency contacts Credit/debit card information Billing Details Visit Details
  • 4. WHY HEALTHCARE INFORMATION IS IN HIGH DEMAND BY CYBERCRIMINALS? Data can be used to launch Email Scams, Identity Theft, & Social Media Frauds. • Cyberattacks on healthcare industry have increased. • 100 million healthcare records were compromised in 2015 • 2015 “The YEAR OF THE HEALTHCARE HACK”. • 88%of all ransomware is detected in the healthcare industry. • The estimated cost of a major healthcare breach is $200 per-patient record. Data Breaches Are Costing The Healthcare Industry approximately $6 Billion Annually (IT’s Including FINES, PENALTIES, LAWSUITS, and DATA RECOVERY COSTS)
  • 5. Top 5 Threats in Healthcare 1. Ransomware : (lot of phishing emails contain ransomware.) 2. Insiders : Co-workers Unauthorized physician access Bad security hygiene Misuse of systems 3. Advanced Persistent Threats (APT) Credit/Debit Card Information. 4. Mobile Devices Lost/Stolen Device 5. Employee Negligence Using infected USB Drive Visiting Infected Website Malicious AD Phishing Emails.
  • 6. Legal Risks & Challenges The risks associated with any attack depend on three factors: 1. Threats (who is attacking) 2. Vulnerabilities (the weaknesses they are attacking) 3. Impacts (what the attack does)
  • 7. Legal Risks & Challenges 1. Monitoring Data : (Leads to Privacy & Regulatory actions) 2. Sharing Details : (Leads to Privacy & Regulatory actions) 3. Data rights and ownership (Challenge) 4. Protecting sensitive and personal information (Challenge)