Remove Access Remove Computer and Electronics Remove Insurance Remove Passwords
article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

The Health Insurance Portability and Accountability Act (HIPAA) ensures individuals’ health data protection and privacy. This includes insurance companies, nurses, and doctors. The guidelines ensure that patient information is safe from unauthorized access and sharing. What are the Most Common HIPAA Violations?

article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. See Indiana v. Informatics Eng’g, Inc. , 3:18-cv-00969 (N.D.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Delaware County, Pennsylvania, opted to pay 500K ransom to DoppelPaymer gang

Security Affairs

. “Sources said the county is in the process of paying the $500,000 ransom as it’s insured for such attacks.” “The County of Delaware recently discovered a disruption to portions of its computer network. The incident was disclosed on Monday and now Delaware County has paid a $500,000 ransom.

article thumbnail

OCR Enters into Record Settlement with Anthem

Hunton Privacy

Three years ago, in February 2015, OCR opened a compliance review of Anthem, the nation’s second largest health insurer, following media reports that Anthem had suffered a significant cyberattack. prevent unauthorized access to ePHI. prevent unauthorized access to ePHI. submit annual compliance reports for a period of two years.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

These controls include the following: Implement multifactor authentication: Multifactor authentication is widely lauded as the most effective control to detect and prevent unauthorized access. standard login passwords). hardware tokens and one-time passwords). standard login passwords). what a person has (e.g.,

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

These controls include the following: Implement multifactor authentication: Multifactor authentication is widely lauded as the most effective control to detect and prevent unauthorized access. standard login passwords). hardware tokens and one-time passwords). standard login passwords). what a person has (e.g.,

article thumbnail

Weekly podcast: NHS upgrade, $242m Equifax loss and prison hacker jailed

IT Governance

However, a large part of the loss has been offset by the company’s cyber insurance: Equifax announced that it maintains “$125 million of cybersecurity insurance coverage, above a $7.5 million deductible”, and, since announcing the cyber security incident in September 2017, has “recorded insurance recoveries of $60.0