SlideShare a Scribd company logo
Webinar

Wearable technologies,
privacy and IP rights
Global Lawyers Association

Giulio Coraggio
DLA Piper Italy
giulio.coraggio@dlapiper.com
November 20, 2013
What is all about?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

2
Agenda
 Processing of users' personal data:
 data transfers
 data relating to the holder of the device but also third parties

 How are wearable technologies protected?
 What are the possible additional risks?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

3
Processing of users' data
 Which data protection law applies?
 What consent and authorizations are required? and in the case
of biometric data?
 What security measures shall be adopted?
 What data can be accessed?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

4
Remote patient monitoring system
 Relationship between hospitals / sponsors / platform providers
 Purposes of processing
 Medical treatment, clinical trials, articles etc.
 What are anonymous data?

 Issue applies to any sector

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

5
Cloud projects – transfer of data

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

6
How are these devices protected?
 Is the software a medical device?
 What impact on the growth of the market?

 Trademark protection of generic terms by technology
companies?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

7
Additional risks
 Misuse of confidential information
 information can be collected and transferred to third parties very
easily
 review of companies' internal policy

 Monitoring of employees?
 Collection of sounds/images of third parties

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

8
Thank you!

Giulio Coraggio
DLA Piper Italy
T +39 02 80 618 619
M +39 334 68 81 147
E giulio.coraggio@dlapiper.com
Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

9

More Related Content

What's hot

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
Sagara Gunathunga
 
GDPR Jan 2018 1
GDPR  Jan 2018 1GDPR  Jan 2018 1
GDPR Jan 2018 1
Jason Chapman
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
Ishay Tentser
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Capgemini
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
James Mulhern
 
Remote patient monitoring system
Remote patient monitoring systemRemote patient monitoring system
Remote patient monitoring system
carlajong
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
Trish McGinity, CCSK
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
Tommy Vandepitte
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
bradley_g
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Karina Matos
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
IBM Security
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
Dimitri Sirota
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
DAMA Ireland
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List X
Dave James
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
GalaxyTech International
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
Peter Procházka
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
Michelangelo van Dam
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
Curt Lewis
 

What's hot (20)

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
GDPR Jan 2018 1
GDPR  Jan 2018 1GDPR  Jan 2018 1
GDPR Jan 2018 1
 
S719a
S719aS719a
S719a
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Remote patient monitoring system
Remote patient monitoring systemRemote patient monitoring system
Remote patient monitoring system
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List X
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 

Viewers also liked

Webinar italy remote gaming regulations
Webinar italy remote gaming regulationsWebinar italy remote gaming regulations
Webinar italy remote gaming regulations
Giulio Coraggio
 
Scommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declinoScommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declino
Giulio Coraggio
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industry
Giulio Coraggio
 
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Giulio Coraggio
 
Legal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery marketLegal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery market
Giulio Coraggio
 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
Giulio Coraggio
 
Cyber risk e assicurazioni
Cyber risk e assicurazioniCyber risk e assicurazioni
Cyber risk e assicurazioni
Giulio Coraggio
 
Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2
Giulio Coraggio
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property RightsShwet Kamal
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
Gayle Gorvett
 
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
Mirjana Acimovic
 
Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Manish Mandhyan
 
Information Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO GamingInformation Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO Gaming
houselan
 
AML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - GamingAML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - Gaming
Narelle Davidson Hospitality Compliance Consultant
 
Paddy Power -Sarah Fay
Paddy Power -Sarah FayPaddy Power -Sarah Fay
Paddy Power -Sarah FaySarah Fay
 
Paddy Power powerpoint
Paddy Power powerpointPaddy Power powerpoint
Paddy Power powerpoint
StephanieReed15
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
Arete-Zoe, LLC
 
CLE - Introduction to IP Law
CLE - Introduction to IP LawCLE - Introduction to IP Law
CLE - Introduction to IP Law
Woodard, Emhardt, Henry, Reeves & Wagner, LLP
 

Viewers also liked (18)

Webinar italy remote gaming regulations
Webinar italy remote gaming regulationsWebinar italy remote gaming regulations
Webinar italy remote gaming regulations
 
Scommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declinoScommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declino
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industry
 
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
 
Legal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery marketLegal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery market
 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
 
Cyber risk e assicurazioni
Cyber risk e assicurazioniCyber risk e assicurazioni
Cyber risk e assicurazioni
 
Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
 
Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006
 
Information Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO GamingInformation Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO Gaming
 
AML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - GamingAML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - Gaming
 
Paddy Power -Sarah Fay
Paddy Power -Sarah FayPaddy Power -Sarah Fay
Paddy Power -Sarah Fay
 
Paddy Power powerpoint
Paddy Power powerpointPaddy Power powerpoint
Paddy Power powerpoint
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
CLE - Introduction to IP Law
CLE - Introduction to IP LawCLE - Introduction to IP Law
CLE - Introduction to IP Law
 

Similar to Wearable technologies, privacy and intellectual property rights

Patient remote monitoring system in Wearable Technology
Patient remote monitoring system in Wearable TechnologyPatient remote monitoring system in Wearable Technology
Patient remote monitoring system in Wearable TechnologyMike Evans
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
Sarah Crabb
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
Interaktiv
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
Alberto Canadè
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
ARMA International
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
Gabor Farkas
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
Jean-Michel Tyszka
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
ImpactQA
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
Capgemini
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
dipak sahoo
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedShradha Verma
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
yashapnt
 
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docxRunning head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
jeanettehully
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart grids
Rónán Kennedy
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDPRunning head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP
MalikPinckney86
 
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docxRunning head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
gemaherd
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
Jason Lackey
 

Similar to Wearable technologies, privacy and intellectual property rights (20)

Patient remote monitoring system in Wearable Technology
Patient remote monitoring system in Wearable TechnologyPatient remote monitoring system in Wearable Technology
Patient remote monitoring system in Wearable Technology
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_published
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docxRunning head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart grids
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDPRunning head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP
 
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docxRunning head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docx
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 

More from Giulio Coraggio

Come conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurityCome conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurity
Giulio Coraggio
 
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazioneInfografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
Giulio Coraggio
 
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurityDirettiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
Giulio Coraggio
 
Decreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDRDecreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDR
Giulio Coraggio
 
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito webNuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
Giulio Coraggio
 
New Italian rules on accessibility of websites
New Italian rules on accessibility of websitesNew Italian rules on accessibility of websites
New Italian rules on accessibility of websites
Giulio Coraggio
 
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Giulio Coraggio
 
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenzeDOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
Giulio Coraggio
 
Good practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in ItalyGood practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in Italy
Giulio Coraggio
 
Le modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziendeLe modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziende
Giulio Coraggio
 
Good practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in ItalyGood practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in Italy
Giulio Coraggio
 
Good practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in ItalyGood practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in Italy
Giulio Coraggio
 
Good practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in ItalyGood practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in Italy
Giulio Coraggio
 
Good practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in ItalyGood practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in Italy
Giulio Coraggio
 
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Giulio Coraggio
 
Italian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do'sItalian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do's
Giulio Coraggio
 
Good practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in ItalyGood practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in Italy
Giulio Coraggio
 
Come gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomwareCome gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomware
Giulio Coraggio
 
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Giulio Coraggio
 
Come gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomwareCome gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomware
Giulio Coraggio
 

More from Giulio Coraggio (20)

Come conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurityCome conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurity
 
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazioneInfografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
 
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurityDirettiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
 
Decreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDRDecreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDR
 
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito webNuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
 
New Italian rules on accessibility of websites
New Italian rules on accessibility of websitesNew Italian rules on accessibility of websites
New Italian rules on accessibility of websites
 
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
 
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenzeDOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
 
Good practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in ItalyGood practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in Italy
 
Le modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziendeLe modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziende
 
Good practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in ItalyGood practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in Italy
 
Good practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in ItalyGood practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in Italy
 
Good practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in ItalyGood practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in Italy
 
Good practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in ItalyGood practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in Italy
 
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
 
Italian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do'sItalian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do's
 
Good practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in ItalyGood practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in Italy
 
Come gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomwareCome gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomware
 
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
 
Come gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomwareCome gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomware
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Wearable technologies, privacy and intellectual property rights

  • 1. Webinar Wearable technologies, privacy and IP rights Global Lawyers Association Giulio Coraggio DLA Piper Italy giulio.coraggio@dlapiper.com November 20, 2013
  • 2. What is all about? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 2
  • 3. Agenda  Processing of users' personal data:  data transfers  data relating to the holder of the device but also third parties  How are wearable technologies protected?  What are the possible additional risks? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 3
  • 4. Processing of users' data  Which data protection law applies?  What consent and authorizations are required? and in the case of biometric data?  What security measures shall be adopted?  What data can be accessed? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 4
  • 5. Remote patient monitoring system  Relationship between hospitals / sponsors / platform providers  Purposes of processing  Medical treatment, clinical trials, articles etc.  What are anonymous data?  Issue applies to any sector Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 5
  • 6. Cloud projects – transfer of data Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 6
  • 7. How are these devices protected?  Is the software a medical device?  What impact on the growth of the market?  Trademark protection of generic terms by technology companies? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 7
  • 8. Additional risks  Misuse of confidential information  information can be collected and transferred to third parties very easily  review of companies' internal policy  Monitoring of employees?  Collection of sounds/images of third parties Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 8
  • 9. Thank you! Giulio Coraggio DLA Piper Italy T +39 02 80 618 619 M +39 334 68 81 147 E giulio.coraggio@dlapiper.com Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 9

Editor's Notes

  1. deliberaworking party sulle appautorizzazione generale del Garantenotifica al Garante della privacy per profilazione e utilizzo di dati biometrici
  2. Diabetes - Diabetes management requires control of multiple parameters: blood pressure, weight, and blood glucose. The real-time delivery of blood glucose and blood pressure readings enables immediate alerts for patient and healthcare providers to intervene when needed. There is evidence to show that daily diabetes management involving RPM is just as effective as usual clinic visit every 3 months;Congestive heart failure- A systematic review of the literature on home monitoring for heart failure patients indicates that RPM improves quality of life, shortens duration of stay in hospitals, decreases mortality rate, and reduces costs to the healthcare system;Infertility - A recent study of a remote patient monitoring solution for infertility demonstrated that for appropriately screened patients who had been seeking In-Vitro Fertilization (IVF) treatment, a six-month remote monitoring program had the same pregnancy rate as a cycle of IVF.