article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. See Indiana v. Informatics Eng’g, Inc. , filed Dec.

article thumbnail

What is data loss and how does it work?

IT Governance

Data loss refers to the destruction of sensitive information. It’s a specific type of data breach, falling into the ‘availability’ category of data security (the other two categories being ‘confidentiality’ and ‘integrity’). Data loss can also occur when devices suffer water (or other liquid) damage.

IT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 210 – News of the week

Security Affairs

Romanian duo convicted of fraud Scheme infecting 400,000 computers. Gnosticplayers round 5 – 65 Million+ fresh accounts from 8 security breaches available for sale. Locked Shields 2019 – Chapeau, France wins Cyber Defence Exercise. Blue Cross of Idaho data breach, 5,600 customers affected.

article thumbnail

Pennsylvania Supreme Court holds common law duty for employers extends to protecting sensitive employee information

Data Protection Report

UPMC was filed by a group of employees of the University of Pittsburg Medical Center (“UPMC”), alleging a failure in data security resulted in a data breach and the theft of the personal and financial information of UPMC’s 62,000 employees.

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

In this article our dedicated data protection team takes a look at the major features of this new law. There are rules around the use of personal data for marketing purposes. Some of these steps include: Conduct a data mapping exercise. Develop a Record of Processing Activity (ROPA).

article thumbnail

If You’re a Cloud Provider or Consumer, Consider These Guidelines on How to Conduct Yourself in Europe: eDiscovery Best Practices

eDiscovery Daily

While we were preparing to eat turkey and stuff ourselves with various goodies last week, the Cloud Security Alliance (CSA) provided an important guideline for compliance with the European Union General Data Protection Regulation (GDPR).

Cloud 40
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Courts have frequently emphasized privacy concerns in these cases, where a party sought direct access to an opposing party’s computer systems under Rule 34(a)(1), which allows parties “to inspect, copy, test or sample. social security and credit card numbers, employee and patient health data, and customer financial records).”43

Privacy 97