<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Miller Thomson</provider_name><provider_url>https://www.millerthomson.com/en/</provider_url><author_name>Katherine Chan</author_name><author_url>https://www.millerthomson.com/en/author/chank/</author_url><title>French data protection authority fines health software provider &#x20AC;1.5M for failing to protect personal information | Miller Thomson</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="qLKd45cNy5"&gt;&lt;a href="https://www.millerthomson.com/en/insights/cybersecurity/fines-failing-protect-personal-information/"&gt;French data protection authority fines health software provider &#x20AC;1.5M for failing to protect personal information&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.millerthomson.com/en/insights/cybersecurity/fines-failing-protect-personal-information/embed/#?secret=qLKd45cNy5" width="600" height="338" title="&#x201C;French data protection authority fines health software provider &#x20AC;1.5M for failing to protect personal information&#x201D; &#x2014; Miller Thomson" data-secret="qLKd45cNy5" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.millerthomson.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.millerthomson.com/wp-content/uploads/2024/10/Insights_Cybersecurity_Post-Image.jpg</thumbnail_url><thumbnail_width>1776</thumbnail_width><thumbnail_height>994</thumbnail_height><description>Cybersecurity attacks, data security, and privacy breaches are no longer confined to the technical and esoteric discussions of lawyers, IT professionals, and privacy communities but rather over the past two years have become part of &#x201C;coffee row&#x201D; and &#x201C;water cooler&#x201D; conversations (whether or not those conversations were actually being had around the water cooler or, [&hellip;]</description></oembed>
