article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

Some of the data that it covers are: Electronic health records Billing details Health insurance information The Importance of Compliance There are severe consequences to not abiding by the HIPAA rules. For example, if a hospital’s computer system isn’t regularly updated, it can be more vulnerable to security and cyber attacks.

article thumbnail

Twenty-One Points, Less Than 350 Words: eDiscovery Best Practices

eDiscovery Daily

As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). Do you feel you have an adequate understanding of technical concepts like electronic storage?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is data loss and how does it work?

IT Governance

Reminding employees to exercise caution and to back up information wherever possible will mitigate this risk. Unlike desktop computers, laptops don’t have extra covers to protect them from water damage, which increases your risk of electronic components short circuiting. Computer viruses.

IT 98
article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

This latest impersonation campaign makes the case for ensuring users are vigilant when interacting with the web – something accomplished through continual Security Awareness Training. Blog post with links: [link] [Live Demo] Ridiculously Easy Security Awareness Training and Phishing Old-school awareness training does not hack it anymore.

article thumbnail

Vint Cerf: Maybe We Need an Internet Driver’s License

John Battelle's Searchblog

Is there a moment in the history of computing that is as significant as the one we’re in now? And that has been the workhorse of the design of computer chips for years and years. And that has been the workhorse of the design of computer chips for years and years. Others have said, it’s as significant as the iPhone.

article thumbnail

Information Management in the Not-So-Distant Future of Health Care

AIIM

Today, if you have a computer, you have a doctor – videoconference doctor visits routinely complement in-person ones. Electronic Health Record. Almost all hospitals have adopted the Electronic Health Record (EHR). Security is not a one-and-done exercise, though. The two sometimes operate at cross purposes. Telemedicine.

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

This include that data controllers must not use personal means of communications, including postal and electronic addresses, of the data subject in order to sent promotional or awareness materials without first obtaining the consent of the data subject, and providing the data subject with a mechanism to opt out. Has the process been tested?