Search Results for: Régulation

Hospitals facing a different kind of infection: computer viruses

computer viruses

Hervé Debar, Télécom SudParis – Institut Mines-Télécom WannaCry was the first case of a cyberattack that had a major effect on hospitals. The increasing digitization of hospitals (like all areas of society) offers significant opportunities for reducing the cost of health care while making the care provided more effective. However, with digitization comes cybersecurity challenges and these threats must be …

Read More »

What’s new in the atmosphere?

atmosphere

In conjunction with the 4th National Conference on Air Quality held in Montrouge on 9 and 10 October 2018, I’MTech sat down with François Mathé, a researcher in atmospheric sciences at IMT Lille Douai to ask him five questions. He gave us a glimpse of the major changes ahead in terms of measuring and monitoring air pollutants. Between revising the …

Read More »

AI in healthcare for the benefit of individuals and society?

healthcare

Article written by Christian Roux (Director of Research and Innovation at IMT), Patrick Duvaut (Director of Innovation at IMT), and Eric Vibert (professor at Université Paris-Sud/Université Paris Saclay, and surgeon at Hôpital Paul Brousse (AP-HP) in Villejuif). How can artificial intelligence be built in such a way that it is humanistic, explainable and ethical? This question is central to discussions …

Read More »

Four flagship measurements of the GDPR for the economy

GDPR

Patrick Waelbroeck, Professor in Economic Sciences, Télécom ParisTech, Institut Mines-Télécom (IMT) Numerous scandals concerning data theft or misuse that have shaken the media in recent years have highlighted the importance of data protection. The implementation of the General Data Protection Regulation (GDPR) in Europe is designed to do just that through four flagship measurements: seals of trust, accountability, data portability …

Read More »

PAPAYA: a European project for a confidential data analysis platform

Papaya

EURECOM is coordinating the three-year European project, PAPAYA, launched on May 1st. Its mission: enable cloud services to process encrypted or anonymized data without having to access the unencrypted data. Melek Önen, a researcher specialized in applied cryptography, is leading this project. In this interview she provides more details on the objectives of this H2020 project.   What is the …

Read More »

The economy of promises, how to fall in love with a growth rate

growth

Fabrice Flipo, Institut Mines-Telecom Business School This article was published in association with the “Does progress have a future?” series of conferences organized by the Cité des Sciences et de l’Industrie, from Tuesday 15 to 26 May 2018. Over a two-week period, groups of students, a panel of citizens and scientists, historians and philosophers shared their views and debated the …

Read More »

GDPR: towards values and policies

GDPR, RGPD

On May 25th, the GDPR came into effect. This new regulation requires administrations and companies in the 27 EU countries to comply with the law on the protection of personal data. Since its creation in 2013, the IMT Research Chair Values and Policies of Personal Information (CVPIP) aims to help businesses, citizens and public authorities in their reflections on the …

Read More »

The End of Web Neutrality: The End of the Internet?

neutrality

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay At end 2017, a decision issued by the  Federal Communication Commission (FCC), the American agency responsible for regulating the American telecom sector (equivalent of the French ARCEP and the European BEREC), has changed the status of American Internet service providers. However, this change cannot take place in Europe due to the …

Read More »

Hardware attacks, a lingering threat for connected objects

hardware attacks

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against connected objects. Jean-Max Dutertre’s team at Mines Saint-Étienne is committed …

Read More »