article thumbnail

HHS Announces Settlements with Health Care System and Medical Research Institute over Potential HIPAA Violations

Hunton Privacy

million settlement with the Minnesota Attorney General for violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) and its implementing regulations, and various Minnesota debt collection and consumer protection laws. In 2012, Accretive entered into a $2.5

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Here are three cases related to privilege issues, including one where the court granted a quick peek request by the plaintiff, citing the “court’s heavy caseload and limited resources”: Putting Information on File Share Site without Protection Waives Privilege, Court Rules : In Harleysville Insurance Co. Wilkinson, Jr. WAIVER OF PRIVILEGE.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

A sophisticated set of encryption and electronics is at work inside the vehicle. Vamosi: In my book from 2011 When Gadgets Betray Us , I profiled a young Czech born streetwise car thief, an unlikely example of a high tech criminal. Lacking any formal computer training. And for the most part, this is true.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. A cloud-first “mind-shift” implies using a cloud computing model, which exposes an organization to risks on the Internet, where data is considered “digital gold” that cyber criminals want to steal. 2020, p 6).

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities. The Computer-Aided Investigative Environment (CAINE) is an open-source Ubuntu- and Linux-based distribution created by Italian developers for digital forensic purposes. Magnet Forensics.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

DiGiusti granted the “Children” defendants’ Motion to Compel against non-party City of Oklahoma City Police Department (“OCPD”) to comply with the Children’s subpoena of records related to the murder of their father in a civil case with the insurance company. 2011: Part 1 , Part 2 , Part 3 , Part 4. Hospital Partners, Inc. Stay tuned!

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. If you think that your data has been anonymised, according to the computational privacy group at Imperial College, you will be wrong. Therefore, we need to give reassurance on that. The third issue is scrutiny.

GDPR 120