Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Big data and cyber security legal risks and challenges
1. Big Data and Cyber
Security Legal Risks and
Challenges
KAPIL MEHROTRA
DATE : 17/11/2016
2. What Is Big Data?
Extremely large data sets that may be analysed to reveal patterns, trends, and associations, especially relating
to human behaviour and interactions.
Technology has touched every aspect of our lives, be it using Google Maps, Skype, What's Up, Facebook,
Twitter, Email, Smart Phones, Smart Devices, IOT devices, Credit/Debit cards etc.
And amidst all the benefits that technology has delivered, lies our personally identifiable information (PII).
3. Big Data In Healthcare ?
The medical industry already collects a huge amount of data through individual doctors, hospitals, and clinics.
Unifying that data — and combining it with patient-collected data from smart devices(wearables, BP, Glucose
monitoring etc) is the end objective of next level of patient care.
Sample Data Captured in all the healthcare :
Name
DOB
Home addresses
Phone number
Email IDs
Family History
Insurance details
Personal ID details
Vitals
Medical history
Conditions/disease
LAB Tests
Emergency contacts
Credit/debit card information
Billing Details
Visit Details
4. WHY HEALTHCARE INFORMATION IS IN HIGH DEMAND BY CYBERCRIMINALS?
Data can be used to launch Email Scams, Identity Theft, & Social Media Frauds.
• Cyberattacks on healthcare industry have increased.
• 100 million healthcare records were compromised in 2015
• 2015 “The YEAR OF THE HEALTHCARE HACK”.
• 88%of all ransomware is detected in the healthcare industry.
• The estimated cost of a major healthcare breach is $200 per-patient record.
Data Breaches Are Costing The Healthcare Industry approximately $6 Billion Annually
(IT’s Including FINES, PENALTIES, LAWSUITS, and DATA RECOVERY COSTS)
5. Top 5 Threats in Healthcare
1. Ransomware :
(lot of phishing emails contain ransomware.)
2. Insiders :
Co-workers
Unauthorized physician access
Bad security hygiene
Misuse of systems
3. Advanced Persistent Threats (APT)
Credit/Debit Card Information.
4. Mobile Devices
Lost/Stolen Device
5. Employee Negligence
Using infected USB Drive
Visiting Infected Website
Malicious AD
Phishing Emails.
6. Legal Risks & Challenges
The risks associated with any attack depend on three factors:
1. Threats (who is attacking)
2. Vulnerabilities (the weaknesses they are attacking)
3. Impacts (what the attack does)
7. Legal Risks & Challenges
1. Monitoring Data :
(Leads to Privacy & Regulatory actions)
2. Sharing Details :
(Leads to Privacy & Regulatory actions)
3. Data rights and ownership
(Challenge)
4. Protecting sensitive and personal information
(Challenge)