article thumbnail

HHS Announces Settlements with Health Care System and Medical Research Institute over Potential HIPAA Violations

Hunton Privacy

In announcing the settlement with North Memorial, OCR Director Jocelyn Samuels noted that North Memorial had overlooked “[t]wo major cornerstones of the HIPAA Rules” by failing to enter into compliant BAAs and conducting a risk analysis. The resolution agreement requires North Memorial to pay $1.55 Feinstein Institute.

article thumbnail

New UK Online Behavioral Advertising Code Released

Hunton Privacy

Article 5(3) of the amended EU e-Privacy Directive (Directive 2002/58/EC as amended by Directive 2009/136/EC) requires that users must be provided with “clear and comprehensive information” and must give their prior informed opt-in consent before any cookies are set on their “terminal equipment” ( e.g. , computer or mobile device).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Thurston granted the defendants’ motion to compel (in part), ordering the plaintiffs’ to “produce all emails and other documents sought by the defendants in the format demanded with the accompanying metadata from the native computer”. 2011: Part 1 , Part 2 , Part 3 , Part 4. Cummins, Inc. Metadata Plays Key Role in $10.8 Ensing, et.

article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Three

eDiscovery Daily

So, if your case was only worth $400,000 and after analysis and discussion with your client, you believe you cannot spend more than $10,000 for ESI processing and hosting services over the anticipated 18-month life of the case, you had a problem. By 2011, the question was paramount but we began to see some glimmer of hope.

article thumbnail

Doing Digital Right (A Book Review)

Information is Currency

The challenge isn’t just managing electronic records, but non-records, content and other data as all information needs to be governed because all information provides risk because of many factors such as e-discovery, data breaches and so much more. This book is primarily about digital disruption and how to be prepared for it.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Two: eDiscovery Best Practices

eDiscovery Daily

11 (2011): Overall, the myth that exhaustive manual review is the most effective—and therefore, the most defensible—approach to document review is strongly refuted. Ralph calls it the multi-modal approach: a combination of people and computers to get the best result. & TECH. In short, analytics are the individual tools.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

While several open-source tools exist for disk and data capture, network analysis, and specific device forensics, a growing number of vendors are building off what’s publicly available. Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities.