Search Results (617)
Documents on Internet Law, Computer & Data Services, Health Care
Show: results per page
|Cybersecurity Assessment Observations|
Craig N. Landrum; Jones Walker LLP;
November 17, 2014, previously published on November 13, 2014In June 2014, the Federal Financial Institutions Examination Council ("FFIEC") launched a pilot cybersecurity testing program utilizing upcoming state and federal regulatory examinations at more than 500 community financial institutions. The purpose of the effort was to assess how these...
|Six Myths about Data Privacy and Security that Professional Employer Organizations Should Skip|
Ted Nick Kazaglis, Joseph J. Lazzarotti; Jackson Lewis P.C.;
November 14, 2014, previously published on October 22, 2014Data breaches and compliance failures threaten company reputation and put individuals’ personal identities, finances, and medical information in jeopardy. In the Professional Employer Organization (PEO) industry, where companies providing PEO or other human resource outsourcing services...
|FCC Issues $10 Million Fine for Data Security Breach|
Adam C. Smith; McDonald Hopkins LLC;
November 11, 2014, previously published on October 29, 2014The Federal Communications Commission (FCC) recently issued a joint fine to two related telecommunications companies in the amount of $10 million.
|Waiting to Analyze Your Data Vulnerabilities? Do So at Your Own Risk|
Richard H. Blake; McDonald Hopkins LLC;
November 11, 2014, previously published on October 28, 2014Still debating whether to conduct a serious analysis of your company’s data security vulnerabilities? Well, consider this...
|FCC Proposes $10 Million Forfeiture for Privacy Violations|
Richard L. Reiter; Wilson Elser Moskowitz Edelman & Dicker LLP;
November 10, 2014, previously published on October 30, 2014On October 24, 2014, the Federal Communications Commission (FCC) proposed a $10 million forfeiture penalty against TerraCom, Inc. (TerraCom) and YourTel America, Inc. (YourTel) (collectively, the Corporations) for alleged data security violations. Although the FCC is currently unaware of any...
|Healthcare Home Monitoring Company Avoids FCRA Liability Over Stolen Laptop|
Michael J. Zbiegien; Taft Stettinius & Hollister LLP;
November 8, 2014, previously published on October 13, 2014Theft or accidental loss of a laptop, thumb drive or other device is “[t]he single most common way that protected health information is compromised.” And while violating the Health Insurance Portability and Accountability Act’s Privacy and Security Rules can result in...
|Managing Social Media Risks in Healthcare|
Laura R. Hammargren; Mayer Brown LLP;
October 14, 2014, previously published on October 9, 2014The staggering statistics on the use of social media should come as a surprise to no one. According to 2014 numbers, 74% of adults with online access use social networking sites. For Internet users between ages 18 and 29, that figure is over 90%. Facebook alone has 1.32 billion active users.
|A Different Kind of “Virus”: FDA Follows NIST Framework in Cybersecurity Guidance for Medical Devices|
Joshua T. Foust; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
October 13, 2014, previously published on October 8, 2014In past posts we’ve taken a close look at the Framework for Improving Critical Infrastructure Cybersecurity put forth by the National Institute of Standards and Technology (NIST), exploring its wide-ranging implications for companies across a number of different industries. As we’ve...
|Nude Photos and National Cyber Security Awareness Month|
Cynthia J. Larose; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
October 13, 2014, previously published on October 2, 2014October is National Cyber Security Awareness Month. This is an opportunity to remind employees (and yourselves) about how to keep corporate networks and their own cyber lives secure. All month, we will post articles that might be useful for distribution as “reminders....” along...
|Implementing An Information Governance Program|
Mayer Brown LLP;
July 15, 2014, previously published on June 2014The IT department of a retail company implements email account volume limits in attempt to control growing data proliferation. In response, employees in the data analytics department begin using off-system cloud storage options to store their data. The cloud storage company announces that there has...