Remove Compliance Remove Computer and Electronics Remove Education Remove Training
article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

In this article, we’ll talk more about the HIPAA, the importance of compliance, some common HIPAA violations, and more! Some of the data that it covers are: Electronic health records Billing details Health insurance information The Importance of Compliance There are severe consequences to not abiding by the HIPAA rules.

article thumbnail

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

Tom’s involvement with large cases led him to become familiar with dozens of various software applications for litigation support and he has both designed databases and trained legal staffs in their use on many cases. This work has involved both public and private law firms of all sizes across the nation. Monday, March 26: Craig Ball.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Draft Released in the Philippines Implementing Rules for the Data Privacy Act

Hunton Privacy

Sensitive information refers to personal information about an individual’s race, ethnicity, health, education, genetic or sexual life of a person, proceedings related to an offense committed by a person, health records and tax returns. Consent of the data subject has to be evidenced by written, electronic or recorded means.

article thumbnail

Weekly podcast: NCSC and Kaspersky, parliamentary passwords and macOS High Sierra (again)

IT Governance

While the NCSC is right to be concerned about Russian cybercrime, another security threat to Westminster has garnered considerable media coverage this week: it’s become clear that members of parliament need to be much better educated about basic security practices. Including interns on exchange programmes.

article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

This office had sort of crawled to a halt, because they were processing kids that had lost their parents and they were trying to find profiles and sponsors for them, sponsors that pay for their schooling and all that stuff, and their network, their computers were so screwed up that they had to like stop. Kent: Absolutely.

article thumbnail

Ralph Losey of Jackson Lewis, LLP: eDiscovery Trends 2018

eDiscovery Daily

I know how to do it, but I wish I could just train the robot to do it. But I will tell you I’m seeing a lot of compliance, at least in the corporate world, regarding preservation. You’ve talked a lot about search and about TAR on your blog and you have your own TAR training program.

article thumbnail

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

However, the provisions of the GDPR apply beyond Europe, and the GDPR isn’t the only game in town–laws such as the California Consumer Privacy Act (CCPA) have subject access request provisions creating compliance requirements in the Americas from Canada to Brazil. This session has been submitted for CLE accreditation.