Company Info






  Home > Past Conferences >

Life Science Data Privacy Conference



 
Our Price: $495.00

Product Code: 2284
Qty:

  
Product Info
 
About the Product
Includes presentation materials from the conference. Presentations slides are in PDF. format. All files are available for immediate download.


About the Life Science Data Privacy Conference:

Ensuring Robust Data Privacy Policies & Systems that Maintain Security, Mitigate Breaches and Potential Reputational Harm, while Upholding Compliance with Evolving Regulations and Jurisdictions on a State-wide as well as International Level


By nature, the life science industry is one in which a tremendous amount of data is collected and analyzed, as corporations work to develop cutting-edge technologies and therapies that are transforming patient lives and healthcare delivery. In order to adequately protect data and to maintain the privacy of internal as well as patient-level data, corporations must develop and maintain robust privacy policies and systems that proactively mitigate risk while preparing for potential security breaches. Organizations are actively looking to reduce the potential reputational harm caused by security breaches, which in many cases can be even more damaging than potential financial harm.

Understanding evolving regulations and jurisdictions, both in the US as well as internationally, will ensure corporations continue to protect the privacy of data collected and stored around the world. With increasing privacy regulations across Europe as well as differing state-wide regulations in the US, organizations must have a firm grasp on the legal and regulatory frameworks for data protection. Ensuring a strong collaboration between privacy and technology teams will ensure policies and frameworks go beyond paper, and that privacy controls are embedded from the ground up. The Q1 Life Science Patient Data Privacy Conference provided executives from throughout the life science industry an opportunity for engaging dialogue on the many challenges faced in protecting data, and best practices for maintaining robust security.


Share your knowledge of this product. Be the first to write a review »