Remove Computer and Electronics Remove Education Remove Insurance Remove IT
article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

The Health Insurance Portability and Accountability Act (HIPAA) ensures individuals’ health data protection and privacy. This includes insurance companies, nurses, and doctors. Healthcare has become more interconnected than ever, making it important to protect patients’ sensitive information.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

But the same crime can be far more costly and damaging when thieves target small businesses. Unfortunately, far too many entrepreneurs are simply unaware of the threat or don’t know how to be watchful for it. In 2019, Dun & Bradstreet saw more than a 100 percent increase in business identity theft. ” PHANTOM OFFICES. .”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

Craig Ball once made a great point in responding to a post of mine about educating lawyers when he said “ We not only need to persuade lawyers to take the plunge, we need to insure there’s a pool for them to jump into. Do they go to a community night course on computers? Pursue online education? Pursue online education?

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. Covering all computers and file cabinets in plastic sheeting. . The plan was to meet the insurance coordinator at the Howard Avenue office at 8:30 a.m. It was grim.

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! requires the attorney to act reasonably and promptly to stop the breach and mitigate the damage, using “all reasonable efforts” to restore computer operations to be able to continue client services.

article thumbnail

Court Rules Non-Party Subpoenaed ESI Not Subject to 100-Mile Boundary: eDiscovery Case Week

eDiscovery Daily

In this case where the plaintiff claimed breach of contract, bad faith, unjust enrichment, and fraud against the defendant insurance company over the valuation of the plaintiff’s vehicles after two automobile collisions, the plaintiff served non-party Mitchell International, Inc. with a subpoena duces tecum in March 2018.

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

In assessing the plaintiff’s motion, Judge O’Hara noted that “the parties agreed the surveillance video is a form of electronically stored information (“ESI”) subject to the preservation requirements of Rule 37(e)”. The plaintiff subsequently filed the suit in July 2017. Judge’s Ruling.