Outline of main legal issues connected to the usage of wearable technologies with particular reference to privacy and data protection, intellectual property rights and confidentiality
Wearable technologies and remote patient remote monitoring systemGiulio Coraggio
This presentation focuses on issues related to wearable technologies in the healthcare sector whose main expression has been given so far by the so called remote patient monitoring systems
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
Il regolamento privacy europeo comporterà un cambiamento di prospettiva da parte delle aziende. Ma questo cambiamento di prospettiva potrebbe fornire benefici competitivi in quanto i clienti (sia società che consumatori) incominceranno a considerare la conformità alla normativa privacy nelle loro scelte.
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
The Internet of Things (IoT) relies on the large processing of personal data. And with the adoption of the EU Data Protection Regulation, companies investing on IoT technologies shall considerably change their approach, also because of the potential sanctions up to 4% of the global turnover of the breaching entity for privacy breaches.
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
Il regolamento privacy europeo (GDPR) richiede di adottare un nuovo approccio in materia di cyber security a causa del rischio di sanzioni e gli obblighi regolatori applicabili
The presentation covers the main legal issues affecting technologies in the Internet of Things enviroment such as wearable technologies, ehealth devices, smarth home and smart city tools with reference to data protection, telecom, cybercrime, life sciences and regulatory matters.
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
Privacy by design is crucial to adapt the GDPR compliance strategy of copmpanies to new technologies whose evolution will be frenetic at the time of the digitalization.
What changes with the EU Data Protection Regulation for Gambling CompaniesGiulio Coraggio
The General Data Protection Regulation is a massive change for both gaming and gambling operators and suppliers, also introducing sanctions up to 4% of the global turnover of the breaching entity for privacy breaches.
Wearable technologies and remote patient remote monitoring systemGiulio Coraggio
This presentation focuses on issues related to wearable technologies in the healthcare sector whose main expression has been given so far by the so called remote patient monitoring systems
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
Il regolamento privacy europeo comporterà un cambiamento di prospettiva da parte delle aziende. Ma questo cambiamento di prospettiva potrebbe fornire benefici competitivi in quanto i clienti (sia società che consumatori) incominceranno a considerare la conformità alla normativa privacy nelle loro scelte.
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
The Internet of Things (IoT) relies on the large processing of personal data. And with the adoption of the EU Data Protection Regulation, companies investing on IoT technologies shall considerably change their approach, also because of the potential sanctions up to 4% of the global turnover of the breaching entity for privacy breaches.
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
Il regolamento privacy europeo (GDPR) richiede di adottare un nuovo approccio in materia di cyber security a causa del rischio di sanzioni e gli obblighi regolatori applicabili
The presentation covers the main legal issues affecting technologies in the Internet of Things enviroment such as wearable technologies, ehealth devices, smarth home and smart city tools with reference to data protection, telecom, cybercrime, life sciences and regulatory matters.
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
Privacy by design is crucial to adapt the GDPR compliance strategy of copmpanies to new technologies whose evolution will be frenetic at the time of the digitalization.
What changes with the EU Data Protection Regulation for Gambling CompaniesGiulio Coraggio
The General Data Protection Regulation is a massive change for both gaming and gambling operators and suppliers, also introducing sanctions up to 4% of the global turnover of the breaching entity for privacy breaches.
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
In Big Data we focus on the 4 V's: Volume, Velocity, Varity and Veracity. But another important topic is often not in the focus: Privacy and Security. Yet as important and if not considered from the beginning it might put your Big Data project at risk. Learn about most important Privacy and Security fundamentals in Big Data, you should take into account in your next Big Data project.
Privacy by Design - taking in account the state of the artJames Mulhern
Establishing transparency and building trust provide an opportunity to develop greater, more meaningful relationships with data subjects i.e people, customers, colleagues... in turn this can lead to more effective and valuable services that help transform organisations.
A "Privacy by design" approach can help achieve this but it doesn't happen by accident and transformation doesn't occur over night. So a deliberate approach that looks beyond May 2018 and compliance is required.
Presentation to representatives from the technology and Local Government sectors at TechUK, the UK's trade association for the technology.
This report splits Global into several key Regions, with sales (consumption), revenue, market share and growth rate of Remote Patient Monitoring Systems.
To See Full Report Visit @http://bit.ly/2fA9cbS
This Webinar featuring guests from the EU Commission, the French data regulator CNIL, DLA Piper and IBM provided an overview of the new EU data protection and privacy perspective from the perspective of the regulation author, regulator, legal advisor and technology providers.
The General Data Protection Regulation and the DAMA DMBOK – Tools you can use for Compliance
Abstract: The General Data Protection Regulation will be the law governing data privacy in Europe in 2018. Surveys show that less than 50% of organisations are aware of the changes within the legislation, and even fewer have any plan for achieving compliance. In this session, Daragh O Brien takes us on a high level overview of the GDPR and how the disciplines of the DMBOK can help compliance.
Notes: DMBOK is an abbreviation for the "Data Management Book of Knowledge" which is published by DAMA International (The Data Management Association)
Data Loss Prevention (DLP) is often the number one concern for most organizations. With the growth of mobile devices and cloud storage, most network perimeters look more like swiss cheese than brick walls.
See Full Webinar: http://www.gti1.com/webinars/?commid=64955
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
My presentation for SUG Hungary presented on 26.06.2018 with topic Privacy by Design and by Default and General Data Protection Regulation with Sitecore
We now have to obey the law and comply with GDPR, ensuring people's data are securely stored, we track who has access to it and if the client requests to review, update or remove their data, we should do so in an automated fashion. But, are you there yet? Chances are, there's still a long way to go.
In this talk I will address some of the challenges we solved in greenfield projects as well in old, legacy applications. We introduced "privacy by design" as just another "by design" mantra we already had build in our workflow and as we worked on the project, we applied it everywhere when we saw user data (personal or not) was processed. This ensured that all data was handled and treated the same way and allowed the business to reorient themselves again to be creative in approaching their customers.
Scommesse sportive online in Italia, come invertire il declinoGiulio Coraggio
This is the presentation given by the Univerisity of Milan during an event organized by DLA Piper and named "Sports betting in Italy, how to reverse the decline? Countries in comparison for a possible solution".
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
In Big Data we focus on the 4 V's: Volume, Velocity, Varity and Veracity. But another important topic is often not in the focus: Privacy and Security. Yet as important and if not considered from the beginning it might put your Big Data project at risk. Learn about most important Privacy and Security fundamentals in Big Data, you should take into account in your next Big Data project.
Privacy by Design - taking in account the state of the artJames Mulhern
Establishing transparency and building trust provide an opportunity to develop greater, more meaningful relationships with data subjects i.e people, customers, colleagues... in turn this can lead to more effective and valuable services that help transform organisations.
A "Privacy by design" approach can help achieve this but it doesn't happen by accident and transformation doesn't occur over night. So a deliberate approach that looks beyond May 2018 and compliance is required.
Presentation to representatives from the technology and Local Government sectors at TechUK, the UK's trade association for the technology.
This report splits Global into several key Regions, with sales (consumption), revenue, market share and growth rate of Remote Patient Monitoring Systems.
To See Full Report Visit @http://bit.ly/2fA9cbS
This Webinar featuring guests from the EU Commission, the French data regulator CNIL, DLA Piper and IBM provided an overview of the new EU data protection and privacy perspective from the perspective of the regulation author, regulator, legal advisor and technology providers.
The General Data Protection Regulation and the DAMA DMBOK – Tools you can use for Compliance
Abstract: The General Data Protection Regulation will be the law governing data privacy in Europe in 2018. Surveys show that less than 50% of organisations are aware of the changes within the legislation, and even fewer have any plan for achieving compliance. In this session, Daragh O Brien takes us on a high level overview of the GDPR and how the disciplines of the DMBOK can help compliance.
Notes: DMBOK is an abbreviation for the "Data Management Book of Knowledge" which is published by DAMA International (The Data Management Association)
Data Loss Prevention (DLP) is often the number one concern for most organizations. With the growth of mobile devices and cloud storage, most network perimeters look more like swiss cheese than brick walls.
See Full Webinar: http://www.gti1.com/webinars/?commid=64955
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
My presentation for SUG Hungary presented on 26.06.2018 with topic Privacy by Design and by Default and General Data Protection Regulation with Sitecore
We now have to obey the law and comply with GDPR, ensuring people's data are securely stored, we track who has access to it and if the client requests to review, update or remove their data, we should do so in an automated fashion. But, are you there yet? Chances are, there's still a long way to go.
In this talk I will address some of the challenges we solved in greenfield projects as well in old, legacy applications. We introduced "privacy by design" as just another "by design" mantra we already had build in our workflow and as we worked on the project, we applied it everywhere when we saw user data (personal or not) was processed. This ensured that all data was handled and treated the same way and allowed the business to reorient themselves again to be creative in approaching their customers.
Scommesse sportive online in Italia, come invertire il declinoGiulio Coraggio
This is the presentation given by the Univerisity of Milan during an event organized by DLA Piper and named "Sports betting in Italy, how to reverse the decline? Countries in comparison for a possible solution".
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Giulio Coraggio
La presentazione si focalizza sulle principali problematiche legali relative ai dispositivi smart home concentrandosi sull'interoperabilità tra piattaforme vs. piattaforme open source, gli obblighi in materia di privacy e i rischi in materia di reati informatici e cybercrime
Drones and logistics - What legal issues and how to handle themGiulio Coraggio
The usage of drones in the delivery of products, provision of maintenance services and for safety purposes is proliferating, but what regulatory, privacy, cyber security and liability issues arise?
Open API e problematiche legali al tempo del PSD2Giulio Coraggio
Come l'obbligo imposto dalla Seconda Direttiva sui servizi di pagamento (PSD2) di avere le API impatterà il settore bancario e quali precauzioni devono essere adottate
Data Privacy vs. National Security post Safe HarborGayle Gorvett
Recent Developments in Transatlantic Data Privacy regulation including adoption of Privacy Shield, GDPR and increasing requests for data access for National Security
The European Union is serious about the protection of personal data, including health information. Data controllers must demonstrate that their compelling legitimate interest overrides the interests of the data subjects. Data subjects, in general, have the right to object to the processing of personal data. The reasons for data retention have to be compelling enough, e.g., compliance with a legal obligation, tasks carried out in public interest in the area of public health, the official authority vested in the controller, scientific or historical research, statistical purposes and the defense of legal claims. The recognized risks to natural persons include discrimination, identity theft or fraud, financial loss, damage to reputation, loss of confidentiality of data protected by professional secrecy, the reversal of pseudonymization, and economic and social disadvantage.
Can your organization afford to be fined €20 million for improperly removing customer data, as required by EU’s new General Data Protection Regulation (GDPR)? Seasoned legal and security experts from Blancco Technology Group and DLA Piper distil the legal terminology from the recently approved EU General Data Protection Regulation (GDPR) into 'how' and 'what' your organization needs to know to prepare for compliance by 2018.
GETTINGGDPR-READY MEANS SETTING UP A PRIVACY MANAGEMENT SYSTEM,
BEING ABLE TO SHOW IT AND KEEPING IT EFFECTIVE
A management system is a “living” entity which adapts to business context (new markets-products-services, M&A, demerge, law/policies changes, … ) and improves over time
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...ARMA International
GDPR is Coming, May 25 2018 brings a whole new order of EU Personal Data Privacy and Protection rights, duties and obligations. What changes, what's your risk and how can you start to prepare?
How can a Unified Governance strategy and capabilities transform both your information governance program, and provide a framework for personal data?
How that strategy can leverage metadata to support and accelerate meeting regulatory issues.
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
In this GDPR Compliance presentation, you can learn more about the key steps to take for GDPR Compliance, including:
- What are data management processes and how to identify them at small and medium sized businesses
- What is personal data under the GDPR and how to establish a record of processing activities to map personal data
- How does encryption help with safeguarding personal data and ensuring GDPR compliance
- What your business should do to get ready for the new General Data Protection regulation on time
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docxjeanettehully
Running head: THE IMPACT OF GDPR IN IT POLICY1
THE IMPACT OF GDPR IN IT POLICY8
The Impact of GDPR In IT Policy
Submitted To
Dr. Donnie Grimes
University of the Cumberland’s
Submitted in Fulfillment of Research Paper
Information Technology in Global Economy (ITS-832-22)
Submitted By
Group # 7
Amarender Reddy Chada
Ramu Chilukuri
Mittal Patel
Manoj Kumar Peddarapu
Abstract
The current rapid transformation within the world of I.T., is posing a threat not only to personal information but all sectors associated with I.T. Managing management of essential data is the factor that organizations, business firms, and government agencies are struggling with daily. As the organizations strive to ensure that there is complete protection of data during the storage and sharing process, hackers are also working around the globe to create new ways through which they can breach the data protection servers. The dis-collusion of vital data from one point to another is a systematic process that must be regulated at all costs because if the data gets compromised, the outcomes are severe. This paper analyses all the impacts of GDPR on impacted I.T. policy around the world through an evaluation of several peer-reviewed articles on GDPR.
Keywords: GDPR, Privacy, Cybersecurity, emerging technologies.
Introduction
The process of disclosing data from various agencies ought to point the purpose of the data, state the duration for data use. When sharing critical data with a third party, it is vital to assess the channels through which the data follows. Business firms and public authorities that actively operate by systematic processing of data have to use DPO (data protection officer). Having control of personal data key in ensuring that the data is shared only with the relevant people. With the rising cases of cyber threat and selling of personal data through dark webs, keeping track of your personal information is your full responsibility. Relevant authorities only come in to assist when the case that is compromising data I critical and poses a security threat to other sectors. The primary obligation of GDPR is to ensure that people have control of their most essential data. GDPR achieves control of data by facilitating the crucial environmental data regulation environment.
Articles analysis on GDPR
In the article (Cornock, 2018), Cornock systematically analyzes the primary impacts of GDPR on various research institutions and the actual research activities within various sectors, such as the I.T. and medical sectors. According to the article, there are still several debates on how GDPR is going to affect research in various sectors, starting with the I.T. sectors to the business and marketing sectors on just with the European Union but around the globe. Most of the arguments on GDRP look at the regulation as a potential obstacle to a world of free information sharing. Many people are still not aware of the actual implications that both the E.U. and the world in ...
Date: 15th November 2017
Location: AI Lab Theatre
Time: 16:30 - 17:00
Speaker: Elisabeth Olafsdottir / Santiago Castro
Organisation: Microsoft / Keyrus
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDPMalikPinckney86
Running head: THE IMPACT OF GDPR IN IT POLICY 1
THE IMPACT OF GDPR IN IT POLICY 8
The Impact of GDPR In IT Policy
Submitted To
Dr. Donnie Grimes
University of the Cumberland’s
Submitted in Fulfillment of Research Paper
Information Technology in Global Economy (ITS-832-22)
Submitted By
Group # 7
Amarender Reddy Chada
Ramu Chilukuri
Mittal Patel
Manoj Kumar Peddarapu
Abstract
The current rapid transformation within the world of I.T., is posing a threat not only to personal information but all sectors associated with I.T. Managing management of essential data is the factor that organizations, business firms, and government agencies are struggling with daily. As the organizations strive to ensure that there is complete protection of data during the storage and sharing process, hackers are also working around the globe to create new ways through which they can breach the data protection servers. The dis-collusion of vital data from one point to another is a systematic process that must be regulated at all costs because if the data gets compromised, the outcomes are severe. This paper analyses all the impacts of GDPR on impacted I.T. policy around the world through an evaluation of several peer-reviewed articles on GDPR.
Keywords: GDPR, Privacy, Cybersecurity, emerging technologies.
Introduction
The process of disclosing data from various agencies ought to point the purpose of the data, state the duration for data use. When sharing critical data with a third party, it is vital to assess the channels through which the data follows. Business firms and public authorities that actively operate by systematic processing of data have to use DPO (data protection officer). Having control of personal data key in ensuring that the data is shared only with the relevant people. With the rising cases of cyber threat and selling of personal data through dark webs, keeping track of your personal information is your full responsibility. Relevant authorities only come in to assist when the case that is compromising data I critical and poses a security threat to other sectors. The primary obligation of GDPR is to ensure that people have control of their most essential data. GDPR achieves control of data by facilitating the crucial environmental data regulation environment.
Articles analysis on GDPR
In the article (Cornock, 2018), Cornock systematically analyzes the primary impacts of GDPR on various research institutions and the actual research activities within various sectors, such as the I.T. and medical sectors. According to the article, there are still several debates on how GDPR is going to affect research in various sectors, starting with the I.T. sectors to the business and marketing sectors on just with the European Union but around the globe. Most of the arguments on GDRP look at the regulation as a potential obstacle to a world of free information sharing. Many people are still not aware of the actual implications that both the E.U. and the world ...
Running head THE IMPACT OF GDPR IN IT POLICY1THE IMPACT OF GDP.docxgemaherd
Running head: THE IMPACT OF GDPR IN IT POLICY 1
THE IMPACT OF GDPR IN IT POLICY 8
The Impact of GDPR In IT Policy
Submitted To
Dr. Donnie Grimes
University of the Cumberland’s
Submitted in Fulfillment of Research Paper
Information Technology in Global Economy (ITS-832-22)
Submitted By
Group # 7
Amarender Reddy Chada
Ramu Chilukuri
Mittal Patel
Manoj Kumar Peddarapu
Abstract
The current rapid transformation within the world of I.T., is posing a threat not only to personal information but all sectors associated with I.T. Managing management of essential data is the factor that organizations, business firms, and government agencies are struggling with daily. As the organizations strive to ensure that there is complete protection of data during the storage and sharing process, hackers are also working around the globe to create new ways through which they can breach the data protection servers. The dis-collusion of vital data from one point to another is a systematic process that must be regulated at all costs because if the data gets compromised, the outcomes are severe. This paper analyses all the impacts of GDPR on impacted I.T. policy around the world through an evaluation of several peer-reviewed articles on GDPR.
Keywords: GDPR, Privacy, Cybersecurity, emerging technologies.
Introduction
The process of disclosing data from various agencies ought to point the purpose of the data, state the duration for data use. When sharing critical data with a third party, it is vital to assess the channels through which the data follows. Business firms and public authorities that actively operate by systematic processing of data have to use DPO (data protection officer). Having control of personal data key in ensuring that the data is shared only with the relevant people. With the rising cases of cyber threat and selling of personal data through dark webs, keeping track of your personal information is your full responsibility. Relevant authorities only come in to assist when the case that is compromising data I critical and poses a security threat to other sectors. The primary obligation of GDPR is to ensure that people have control of their most essential data. GDPR achieves control of data by facilitating the crucial environmental data regulation environment.
Articles analysis on GDPR
In the article (Cornock, 2018), Cornock systematically analyzes the primary impacts of GDPR on various research institutions and the actual research activities within various sectors, such as the I.T. and medical sectors. According to the article, there are still several debates on how GDPR is going to affect research in various sectors, starting with the I.T. sectors to the business and marketing sectors on just with the European Union but around the globe. Most of the arguments on GDRP look at the regulation as a potential obstacle to a world of free information sharing. Many people are still not aware of the actual implications that both the E.U. and the world ...
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
GDPR (EU 2016/679) and NIS are intended to strengthen data protection for people in the EU, replacing Directive 95/46/EC. Learn how HyTrust can help with compliance.
Similar to Wearable technologies, privacy and intellectual property rights (20)
Come conformarsi al Regolamento DORA sulla cybersecurityGiulio Coraggio
Il Regolamento DORA introduce nuovi obblighi di cybersecurity per banche, assicurazioni, società di servizi di criptovalute, istituzioni finanziarie e i loro fornitori.
In questa infografica, gli avvocati Maria Chiara Meneghetti e Deborah Paracchini dello studio legale DLA Piper danno delle indicazioni su cosa fare per conformarsi agli obblighi previsti dal regolamento. Si tratta di adempimenti sia tecnici che legali che richiedono un approccio integrato alla messa in conformità.
E' possibile leggere un articolo sull'argomento al seguente link https://dirittoaldigitale.com/2022/12/27/regolamento-dora-approvato-cybersecurity/
Infografica sulle 5 regole privacy per i programmi di fidelizzazioneGiulio Coraggio
In un recente provvedimento del Garante per la protezione dei dati personali, l’Autorità emesso una sanzione di € 1,4 milioni contro una società di cosmetici ribadendo quali sono i principi cardine ai sensi della normativa privacy da considerare quando si istituiscono programmi di fidelizzazione. In questa infografica, Deborah Paracchini dello studio legale DLA Piper ricapitola quali sono le 5 regole fondamentali ai sensi della normativa privacy per le aziende che si trovano a gestire programmi relativi a fidelity card.
Direttiva NIS2 - Nuovi obblighi legali di cybersecurityGiulio Coraggio
La Direttiva NIS2 è stata approvata e introduce gravosi obblighi in materia di cybersecurity per un ampio numero di società.
Gli ultimi anni hanno visto un aumento esponenziale del rischio cyber tale da indurre i legislatori nazionali ed europei ad innalzare le difese contro eventuali attacchi informatici. La nuova Direttiva NIS2, appena approvata dal Parlamento europeo, si pone in tale ottica quale strumento volto ad aumentare i sistemi di sicurezza di un numero sempre crescente di settori contro i cyberattacchi.
L'infografica realizzata da Enila Elezi dello studio legale DLA Piper analizza i nuovi obblighi legali più rilevanti.
Sul medesimo argomento, può essere interessante l'articolo https://dirittoaldigitale.com/2022/11/14/direttiva-nis2-approvata-cybersecurity/
Decreti di adeguamento ai regolamenti MDR e IVDRGiulio Coraggio
Pubblicati in Gazzetta Ufficiale i decreti legislativi 137 e 138 del 5 agosto 2022 che adeguano il quadro giuridico nazionale in materia di dispositivi medici e di dispositivi medico-diagnostici in vitro alle disposizioni dei Regolamenti (UE) 2017/745 (MDR) e 2017/746 (IVDR).
I nuovi decreti disciplinano aspetti di competenza nazionale, spaziando dai requisiti linguistici per la documentazione che accompagna la commercializzazione di un dispositivo, all’obbligo di registrazione dei distributori nella banca dati nazionale, così come ai criteri per la concessione di autorizzazioni in deroga e alla disciplina sanzionatoria per le violazioni della nuova normativa. Nonostante i dubbi di legittimità, rimane inoltre fermo l’obbligo di preventiva autorizzazione alla pubblicità presso il pubblico dei dispositivi non soggetti a prescrizione e dei dispositivi che possono essere impiegati senza l’assistenza di un medico, mentre la pubblicità verso gli operatori sanitari (che, invece, non necessita di autorizzazione) si dovrà svolgere nel rispetto delle modalità individuate da apposite linee guida del Ministero della Salute.
I decreti nazionali rinviano inoltre a successivi decreti che il Ministero della salute dovrà emanare per disciplinare criteri e procedure in specifici ambiti, tra cui le modalità per registrare i fabbricanti dei dispositivi su misura, per segnalare incidenti e reclami da parte degli operatori sanitari, per il trattamento di singoli pazienti con dispositivi medici che non abbiano espletato o completato le procedure di valutazione della conformità, nonché per registrare e conservare l’identificativo unico del dispositivo (UDI) da parte delle istituzioni sanitarie e gli operatori sanitari. Ulteriori provvedimenti dovranno inoltre definire aspetti riguardanti le indagini cliniche, il programma nazionale di Health Technology Assessment, ed il fondo nazionale per il governo dei dispositivi medici.
Questa infografica contiene un esame della nuova normativa sui dispositivi medici.
Nuove normativa sulla accessibilità applicabili a qualsiasi sito webGiulio Coraggio
Sono entrate in vigore norme onerose sull'accessibilità applicabili a qualsiasi sito web, che richiedono un intervento immediato.
Si tratta di due normative che richiedono sia modifiche tecniche che l'implementazione di nuove comunicazioni e funzionalità su qualsiasi sito web. Le questioni sono affrontate in stile legal design da Enila Elezi e Arianna Angiletta dello studio legale DLA Piper nell'infografica qui di seguito:
New Italian rules on accessibility of websitesGiulio Coraggio
Burdensome Italian laws on accessibility applicable to any website have come into force and require immediate action.
There are two sets of legislation which require both technical changes as well as the implementation of new wordings and features on any website.
This presentation was drafted by Enila Elezi and Arianna Angiletta of the law firm DLA Piper.
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022Giulio Coraggio
Come già accaduto nel 2021, l'IPTT - Italian Privacy Think Tank ha realizzato per il 2022 un survey per valutare il livello di compliance alla normativa privacy delle aziende che operano in Italia, analizzando le problematiche che sono al momento più calde sull'argomento.
Per celebrare un altro anno di GDPR, abbiamo organizzato un webinar in cui analizzeremo i risultati del survey con
- Serena Condu di Plenitude
- Marco Montesano di Amazon
- Marco Ancora di ING Italia
- Giorgio Presepio del Gruppo San Donato e
- Luca Angelini di Admiral Group
moderati da Giulio Coraggio dello studio legale DLA Piper.
Il panel è stato anticipato da un intervento di Deborah Paracchini e Maria Chiara Meneghetti dello studio legale DLA Piper che illustreranno i risultati del survey e le criticità emerse.
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenzeGiulio Coraggio
Riviviamo il webinar organizzato dal team di Intellectual Property dello studio legale DLA Piper sui DOP, i marchi collettivi e i marchi storici.
Di seguito riportiamo l'agenda dell'evento:
Welcome
- Elena Varese - Partner, Co-Head Consumer Goods Food e Retail Sector, DLA Piper
Panel “Indicazioni geografiche e marchi collettivi”
Il sistema delle indicazioni geografiche favorisce il sistema produttivo e l'economia del territorio, così anche, su un binario parallelo, i marchi collettivi geografici svolgono un importante ruolo di valorizzazione del territorio. Cardine di tale sistema è il ruolo dei Consorzi.
- Introduce e modera: Ginevra Righini - Senior Lawyer, DLA Piper
- Panelist:
Simone Calzi - Responsabile dell’Ufficio legale, Consorzio del Prosciutto di Parma
Giulia Belinci - Legale interno – responsabile tutela DOP, Comité Champagne
Panel “Valorizzazione e promozione del made in Italy e dei marchi storici: tutele alternative”. Il Decreto del Ministro dello Sviluppo Economico 10 gennaio 2020 ha istituito il logo Marchio storico di interesse nazionale che le imprese iscritte nel registro possono utilizzare per le finalità commerciali e promozionali e ne ha definito i criteri per l’utilizzo.
- Introduce e modera: Annamaria Algieri - Legal Director/European and Italian Trademark Attorney, DLA Piper
Panelist:
- Davina Baratella - Legal Counsel, Bonomelli
- Manuela Villa - Marketing Manager, Bonomelli
- Patrizia Sforna - Head of Trademarks, Zambon
Closing remarks
- Roberto Valenti - Partner, Head of Life Sciences Sector, DLA Piper
Good practices and common pitfalls on advertising of medical devices in ItalyGiulio Coraggio
The presentation relates to the advertising of tobacco products under the laws of Italy and was drafted by the lawyers Nicola Landolfi and Carolina Battistella of the international law firm DLA Piper.
Le modifiche del Codice del Consumo, come impattano sulle aziendeGiulio Coraggio
A tre mesi dalla data di efficacia delle modifiche al Codice del Consumo apportate dai D.lgs. 170 e 173/2021 in attuazione delle Direttive (UE) 770 e 771/2019, riviviamo il webinar organizzato dal team di Intellectual Property & Technology dello studio legale DLA Piper quale parte dei propri Innovation Breakfast per discutere delle novità introdotte e delle implicazioni per gli operatori coinvolti, tenuti a rivedere la propria operatività.
Good practices and common pitfalls on advertising of tobacco products in ItalyGiulio Coraggio
The presentation relates to the advertising of tobacco products under the laws of Italy and was drafted by the lawyers Carlotta Busani and Giulia Gialletti of the international law firm DLA Piper.
Good practices and common pitfalls on advertising of alcoholic products in ItalyGiulio Coraggio
The presentation relates to the advertising of alcoholic products under the laws of Italy and was drafted by the Federico Di Vizio of the international law firm DLA Piper.
Good practices and common pitfalls on advertising of medicines in ItalyGiulio Coraggio
The presentation relates to the advertising of medicines under the laws of Italy and was drafted by the lawyer, Nicola Landolfi, of the international law firm DLA Piper.
Good practices and common pitfalls on advertising of cosmetics in ItalyGiulio Coraggio
Within the beauty and cosmetics sector, information and advertising campaigns relating to the various products play a primary role, as they are fundamental for building (and, at a later stage, consolidating) consumer trust. This importance has been acquired above all as a result of the expansion of the market through the phenomenon of social media and the growing attention of consumers to goods produced using so-called green or organic components and, above all, cruelty-free products, i.e. products for the realization of which no tests on animals have been carried out.
Moreover, these elements not only have an impact on the formulation of advertising claims, as they aim to convey the identity, values and ethics of the brand - rather than promising miraculous effects through their use - but also significantly influence production requirements.
Yet, when large manufacturers promote certain specific features of their products, such as sustainability and absence of animal testing, certain risks arise: the claim must be truthful and based on rigorous scientific testing, the entire supply chain must be taken into account to verify whether the claim is misleading, and the absence of animal testing cannot be presented as an added value at the European level, as it is a requirement by law.
After all, the cosmetics industry is a highly innovative sector and large companies need to reflect that in their advertising. However, attention must be paid to certain pitfalls: for example, it is necessary to prevent advertising from creating the impression that a cosmetic product has curative effects or effects that transcend the real characteristics and performance of its composition.
And, indeed, although the cosmetics industry tends to have a generally responsible approach to claims and advertising in general, there are still some caveats that need to be carefully considered and some limits that should not be crossed.
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...Giulio Coraggio
Il tragico conflitto tra Russia e Ucraina è anche un conflitto cyber che ha fatto aumentare il cyber rischio rispetto al quale il CSIRT ha dato indicazioni riassunte in questa infografica in stile legal design.
E' delle ultime ore la notizia che Anonymous, il movimento decentralizzato di hacktivismo, ha preso di mira i siti governativi e le TV russe quale parte del devastante conflitto tra Russia ed Ucraina che è attualmente in corso. Tuttavia, esiste un cyber rischio anche per enti, organizzazioni ed aziende che intrattengono rapporti con soggetti ucraini e con i quali siano in essere interconnessioni telematiche (e.g., connessioni B2B, utenze presso reti ucraine e viceversa, condivisione di repository o piattaforme collaborative).
Per agevolare le aziende in questa situazione di difficoltà le esperte di legal design dello studio legale DLA Piper, Deborah Paracchini ed Enila Elezi, hanno riassunto in questa infografica le indicazioni fornite dal CSRIT, il Computer Security Incident Response Team - Italia.
Italian Gambling Advertising Ban – Don'ts and Do'sGiulio Coraggio
In July 2018, Legislative Decree No. 87/2018, also known as the Dignity Decree, was adopted, which among the various objectives of the law also contained the fight against the spread of gambling disorder. Specifically, the regulation introduced for the first time in the Italian legal system the absolute prohibition of advertising relating to games or bets with money winnings (art. 9). The ban concerns any form of advertising, direct or indirect and in any way carried out, with some exceptions. In this infographic, Vincenzo Giuffrè and Enila Elezi of the law firm DLA Piper analyze rules on the Italian gambling advertising ban.
Good practices and common pitfalls on ESG advertising in ItalyGiulio Coraggio
This presentation from the lawyers of the Italian offices of the law firm DLA Piper provide a list of actions to do and to avoid in advertising relating to ESG in Italy
Come gestire gli obblighi privacy di un attacco ransomwareGiulio Coraggio
Enila Elezi dello Studio Legale DLA Piper descrive in stile legal design gli scenari più frequenti che si possono presentare nell'ambito di un data breach derivante da attacco ransomware e come gestire le notifiche al Garante e le comunicazioni privacy agli interessati ai sensi del GDPR.
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...Giulio Coraggio
Quali sono le potenzialità di business dell’intelligenza artificiale, quale è il potenziale impatto del regolamento sull’IA sulle stesse e quali sono le questioni legali ed etiche che rimangono irrisolte dopo il regolamento? Ne abbiamo discusso in webinar organizzato da AIGI con lo studio legale DLA Piper. La presentazione qui pubblicata è stata realizzata da Pietro Scarpino – VP, Head of IoT, VR & AI Service Line di NTT Data e
Giulio Coraggio – Location Head of Italian Intellectual Property and Technology Department di DLA Piper
Come gestire un data breach da attacco ransomwareGiulio Coraggio
In questo webinar, gli Avv.ti Giulio Coraggio, Cristina Criscuoli e Giulia Zappaterra dello studio legale DLA Piper hanno discusso di come gestire un attacco ransomware e di quali possono essere le conseguenze di una gestione inadeguata di simili incidenti.
Il webinar si è concentrato inoltre sull’importanza di adottare una politica efficace in materia di sicurezza informatica e sulle possibili misure da implementare al fine di prevenire il verificarsi di simili attacchi e mitigarne sensibilmente gli effetti ove dovessero avverarsi.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
2. What is all about?
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
2
3. Agenda
Processing of users' personal data:
data transfers
data relating to the holder of the device but also third parties
How are wearable technologies protected?
What are the possible additional risks?
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
3
4. Processing of users' data
Which data protection law applies?
What consent and authorizations are required? and in the case
of biometric data?
What security measures shall be adopted?
What data can be accessed?
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
4
5. Remote patient monitoring system
Relationship between hospitals / sponsors / platform providers
Purposes of processing
Medical treatment, clinical trials, articles etc.
What are anonymous data?
Issue applies to any sector
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
5
6. Cloud projects – transfer of data
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
6
7. How are these devices protected?
Is the software a medical device?
What impact on the growth of the market?
Trademark protection of generic terms by technology
companies?
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
7
8. Additional risks
Misuse of confidential information
information can be collected and transferred to third parties very
easily
review of companies' internal policy
Monitoring of employees?
Collection of sounds/images of third parties
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
8
9. Thank you!
Giulio Coraggio
DLA Piper Italy
T +39 02 80 618 619
M +39 334 68 81 147
E giulio.coraggio@dlapiper.com
Giulio Coraggio - DLA Piper
giulio.coraggio@dlapiper.com
9
Editor's Notes
deliberaworking party sulle appautorizzazione generale del Garantenotifica al Garante della privacy per profilazione e utilizzo di dati biometrici
Diabetes - Diabetes management requires control of multiple parameters: blood pressure, weight, and blood glucose. The real-time delivery of blood glucose and blood pressure readings enables immediate alerts for patient and healthcare providers to intervene when needed. There is evidence to show that daily diabetes management involving RPM is just as effective as usual clinic visit every 3 months;Congestive heart failure- A systematic review of the literature on home monitoring for heart failure patients indicates that RPM improves quality of life, shortens duration of stay in hospitals, decreases mortality rate, and reduces costs to the healthcare system;Infertility - A recent study of a remote patient monitoring solution for infertility demonstrated that for appropriately screened patients who had been seeking In-Vitro Fertilization (IVF) treatment, a six-month remote monitoring program had the same pregnancy rate as a cycle of IVF.