SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
001010010100101
1010010010001001001
0100101001
01000110
001011111100010
0000101010010010001001001
001001001000010001
01001000101001
01001
01001010010
01010010010100100100010101001
010100010100010
01010
10010010010001010
01010010010010010010010
0100100100010001001001001
0100101001010010
0101001001
Health Research in a
COVID-19 Scenario
Data protection officer
Ricard Martínez
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
•
Legal conditions in GDPR and e-Privacy Directive for processing data for health and research
purposes in a pandemic scenario.
1. Research on personal (health) data which consists in the use of data directly collected for the purpose of
scientific studies (“primary use”).
2. Research on personal (health) data which consists of the further processing of data initially collected for
another purpose (“secondary use”).
“scientific research” in this context means “a research project set up in accordance with
relevant sector-related methodological and ethical standards, in conformity with good
practice”
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
Categories of data
❑ (art. 4 GDPR) “data concerning health” means “personal data related to the physical or mental
health of a natural person, including the provision of health care services, which reveal
information about his or her health status”.
✓ Directly considered as:
o Information collected by a health care provider in a patient record.
o Information from a “self check” survey, where data subjects answer questions related
to their health (such as stating symptoms).
✓ By reference or by context
o Information that becomes health data by cross referencing with other data thus
revealing the state of health or health risks.
o Information that becomes health data because of its usage in a specific context.
▪ Socioeconomic data.
▪ Addresses in neighbourhoods with a high rate of infection.
▪ Geolocation.
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
Legal Basis
❑Article 6 and Article 9 GDPR: there is no ranking between the legal bases stipulated in
the GDPR.
❑ Consent:
✓ Double check: National Law + Consent
✓ One requirement when National law allows for the processing of health data with consent.
✓ must be freely given, specific, informed, and unambiguous, and it must be made by way of a
statement or “clear affirmative action”.
✓ Really difficult from patients with a severe disease:
o consent cannot be considered freely given if there is a clear imbalance between the data subject and
the controller.
o the data subjects should not be in a situation of whatsoever dependency with the researchers that
could inappropriately influence the exercise of their free will
✓ Additional requirements (art. 7 GDPR):
o Clearly distinguishable from the other matters, in an intelligible and easily accessible form, using clear
and plain language.
o The data subject shall have the right to withdraw his or her consent at any time.
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
❑National legislations.
✓ Additional safeguards:
o Legal pre-determination.
o Definition of purposes.
o Safeguard the fundamental rights and the interests of the data subject.
o Security measures…
❑Spanish Case:
✓ Organic Law 3/2018 on the Protection of Personal Data and the Guarantee of Digital Rights (17th
additional provision. Processing of health data).
o Consent: may include wide areas linked to a medical or research specialty.
▪ Reuse is allowed for purposes or areas of research related to the area in which the initial study was scientifically integrated.
Does not applies to trials.
o Public health research in cases of epidemics.
Health authorities and public institutions with competence in public health surveillance may carry out scientific studies without
the consent of the affected persons in situations of exceptional public health relevance and seriousness
▪ Vital interests of the data subject or of another natural person… Society?
o Pseudonymized data
(i) There is an express confidentiality and commitment and no re-identification agreement.
o(ii) security measures in place to prevent re-identification and access by unauthorised third parties.
o Further safeguards:
▪ Data Protection Impact Assessment.
▪ Previous Review by the Research Ethics Committee (DPO integrated in)
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
Principles:
❑ Transparency (arts. 13-14):
✓ Directly.
✓ When personal data have not been obtained from the data subject, Article 14 (3) (a) GDPR stipulates that the
controller shall provide the information “within a reasonable period after obtaining the personal data, but at the
latest within one month, having regard to the specific circumstances in which the personal data are processed”.
✓ Exemptions:
o National Law Exemption.
o the provision of such information proves impossible or would involve a disproportionate effort, in particular
for processing for archiving purposes in the public interest, scientific or historical research purposes or
statistical purposes, subject to the conditions and safeguards referred to in Article 89(1).
▪ Proves impossible by the controller “compulsory”.
▪ Disproportionate effort taking into account: the number of data subjects, the age of the data…
❑ Data minimization.
✓ Volume of data.
✓ Limited storage periods.
✓ Anonymisation preference.
❑ Purpose limitation:
✓ Compatibility presumption.
✓ Consent on trials (art. 28 CTR and EU Commission FAQ).
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
❑International data transfers for scientific research purposes:
✓ General rules.
✓ Exemptions.
o “transfer necessary for important reasons of public interest” and “explicit consent” may apply.
▪ Public interest: may require urgent action in the field of scientific research (to identify
treatments and/or develop vaccines vaccines).
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
USE OF LOCATION DATA
❑ Location data collected by electronic communication service providers:
✓ these data can only be transmitted to authorities or other third parties if they have been anonymised by the
provider;
✓ with the prior consent of the users.
❑ Information, including location data, collected directly from the terminal equipment only :
✓ if (i) the user has given consent6 or
✓ (ii) the storage and/or access is strictly necessary for the information society service explicitly requested by the
user
❑ Derogations to the rights and obligations provided for in the “ePrivacy” Directive:
✓ national security (i.e. State security), defence, public security, and the prevention, investigation, detection and
prosecution of criminal offences or of unauthorised use of the electronic communication system
✓ Not health research, or public health
❑
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
Anonymization???????
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
10010100100001010101001001001010100101
01010010001001001010001001001
1001010010010101001001001010100101
01010010001000010100010100101001001001010001001001
A controlled open data environment
❑A solution built on solid pillars:
✓ Adoption of safeguards.
✓ Ensuring the legitimate origin of data and
taking into account national laws.
✓ Risk analysis of reidentification and
anonymization in two steps.
✓ Security measures: same as those applied
to personal data.
✓ Processes that ensure controlled access
without the possibility of data extraction.
✓ Legal guarantees equivalent to those of a
processor: data sharing agreements.
10010100100001010101001001001010100101
01010010001001001010001001001
10100100100101100011100101011011001
1011001010010010000010101001010111001010010100101010
This project has received funding from the European Union’s Horizon 2020 research
and innovation programme under grant agreement No 780495. Any dissemination of
results here presented reflects only the author’s view. The European Commission is
not responsible for any use that may be made of the information it contains.
www.bigmedilytics.eu

Contenu connexe

Similaire à BDVE - Health Research in a COVID 19_Scenario

[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...DataScienceConferenc1
 
Information governance
Information governanceInformation governance
Information governanceGerardo Medina
 
Data protection and data integrity
 Data protection and data integrity Data protection and data integrity
Data protection and data integrityAxon Lawyers
 
EU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationEU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationErik Vollebregt
 
Master thesis defence Merve Şimşek
Master thesis defence Merve ŞimşekMaster thesis defence Merve Şimşek
Master thesis defence Merve ŞimşekMIPLM
 
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Axon Lawyers
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentationAlan Teh
 
Seminar General Data Protection Regulation
Seminar General Data Protection RegulationSeminar General Data Protection Regulation
Seminar General Data Protection RegulationAxon Lawyers
 
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy RegulationThe U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy RegulationCognizant
 
TrustArc Webinar: Level-Up Your Healthcare Privacy Program
TrustArc Webinar: Level-Up Your Healthcare Privacy ProgramTrustArc Webinar: Level-Up Your Healthcare Privacy Program
TrustArc Webinar: Level-Up Your Healthcare Privacy ProgramTrustArc
 
Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...
Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...
Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...Health Catalyst
 
Data Privacy and Security in Clinical Trials: Safeguarding Patient Information
Data Privacy and Security in Clinical Trials: Safeguarding Patient InformationData Privacy and Security in Clinical Trials: Safeguarding Patient Information
Data Privacy and Security in Clinical Trials: Safeguarding Patient InformationClinosolIndia
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
 
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar PharmaLedger
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and ObamacareBarry Smith
 
Android for Healthcare - Droidcon London 2013
Android for Healthcare - Droidcon London 2013Android for Healthcare - Droidcon London 2013
Android for Healthcare - Droidcon London 2013Linden Darling
 
Building public trust in the use of health and care data
Building public trust in the use of health and care dataBuilding public trust in the use of health and care data
Building public trust in the use of health and care dataHealth and Care Innovation Expo
 

Similaire à BDVE - Health Research in a COVID 19_Scenario (20)

[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
 
Information governance
Information governanceInformation governance
Information governance
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Data protection and data integrity
 Data protection and data integrity Data protection and data integrity
Data protection and data integrity
 
EU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationEU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection Regulation
 
Master thesis defence Merve Şimşek
Master thesis defence Merve ŞimşekMaster thesis defence Merve Şimşek
Master thesis defence Merve Şimşek
 
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentation
 
Seminar General Data Protection Regulation
Seminar General Data Protection RegulationSeminar General Data Protection Regulation
Seminar General Data Protection Regulation
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy RegulationThe U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
 
TrustArc Webinar: Level-Up Your Healthcare Privacy Program
TrustArc Webinar: Level-Up Your Healthcare Privacy ProgramTrustArc Webinar: Level-Up Your Healthcare Privacy Program
TrustArc Webinar: Level-Up Your Healthcare Privacy Program
 
Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...
Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...
Unprecedented Patient-Visit Care Continuity: Introducing Health Catalyst Embe...
 
Data Privacy and Security in Clinical Trials: Safeguarding Patient Information
Data Privacy and Security in Clinical Trials: Safeguarding Patient InformationData Privacy and Security in Clinical Trials: Safeguarding Patient Information
Data Privacy and Security in Clinical Trials: Safeguarding Patient Information
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and Obamacare
 
Android for Healthcare - Droidcon London 2013
Android for Healthcare - Droidcon London 2013Android for Healthcare - Droidcon London 2013
Android for Healthcare - Droidcon London 2013
 
Building public trust in the use of health and care data
Building public trust in the use of health and care dataBuilding public trust in the use of health and care data
Building public trust in the use of health and care data
 

Plus de Big Data Value Association

Data Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharingData Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharingBig Data Value Association
 
Key Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplaceKey Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplaceBig Data Value Association
 
GDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharingGDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharingBig Data Value Association
 
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...Big Data Value Association
 
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and PrivacyThree pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and PrivacyBig Data Value Association
 
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...Big Data Value Association
 
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...Big Data Value Association
 
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna Big Data Value Association
 
BDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionalsBDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionalsBig Data Value Association
 
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...Big Data Value Association
 
BDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshopBDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshopBig Data Value Association
 
BDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshopBDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshopBig Data Value Association
 
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...Big Data Value Association
 
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector WebinarBigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector WebinarBig Data Value Association
 
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector WebinarBigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector WebinarBig Data Value Association
 
Virtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for BenchmarkingVirtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for BenchmarkingBig Data Value Association
 
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...Big Data Value Association
 
Policy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical OverviewPolicy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical OverviewBig Data Value Association
 
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...Big Data Value Association
 

Plus de Big Data Value Association (20)

Data Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharingData Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharing
 
Key Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplaceKey Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplace
 
GDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharingGDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharing
 
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
 
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and PrivacyThree pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
 
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
 
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
 
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
 
BDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionalsBDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionals
 
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
 
BDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshopBDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshop
 
BDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshopBDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshop
 
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
 
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector WebinarBigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
 
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector WebinarBigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
 
Virtual BenchLearning - Data Bench Framework
Virtual BenchLearning - Data Bench FrameworkVirtual BenchLearning - Data Bench Framework
Virtual BenchLearning - Data Bench Framework
 
Virtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for BenchmarkingVirtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
 
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
 
Policy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical OverviewPolicy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical Overview
 
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
 

Dernier

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Dernier (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

BDVE - Health Research in a COVID 19_Scenario