Safely Innovating with Sensitive Data: How Comcast and Nuance Drive Value & Protect Privacy
Your organization’s sensitive data is powerful. But failing to use it safely – or failing to use it at all – can lead to reputational damage and loss of trust. When leveraging data derived from people, you can’t have a strong offense without a strong defense.
Find out how your organization can move forward safely and with confidence, earning trust from stakeholders, in this webinar held on October 6, 2021.
Jean Liu, VP and Chief Privacy Officer at Nuance Communications, and Doina Iepuras, Senior Principal Architect at Comcast, shared their successes in driving innovation from the safe and responsible use of sensitive data.
This webinar was hosted by Dr. Richard Wang, Founder & Director of the MIT Chief Data Officer Information Quality (CDOIQ) program, and moderated by Sarah Lyons, Head of Privacy Analytics.
Situation: California’s Consumer Privacy Act inspired Comcast to evolve the way in which they protect the privacy of customers who consent to share personal information with them.
Situation: Integrate.ai’s AI-powered tech helps clients improve their online experience by sharing signals about website visitor intent. They wanted to ensure privacy remained fully protected within the machine learning / AI context that produces these signals.
Situation: Novartis’ digital transformation in drug R&D drives their need to maximize value from vast stores of clinical study data for critical internal research enabled by their data42 platform.
Situation: CancerLinQ™, a subsidiary of American Society of Clinical Oncology, is a rapid learning healthcare system that helps oncologists aggregate and analyze data on cancer patients to improve care. To achieve this goal, they must de-identify patient data provided by subscribing practices across the U.S.
Situation: Needed to ensure the primary market research process was fully compliant with internal policies and regulations such as GDPR.
Situation: Needed to enable AI-driven product innovation with a defensible governance program for the safe and responsible use
of voice-to-text data under Shrems II.
This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.