article thumbnail

Data Protection: Where’s the Brexit Privacy Dividend?

Data Protector

Removing the UK from the decision-making structures of the EU should also result in the UK Government feeling able to update other privacy legislation, such as the outdated Privacy & Electronic Communications Regulations, without having to delay for years and years until EU countries managed to reach a political consensus on the way ahead.

Privacy 156
article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

Some of the data that it covers are: Electronic health records Billing details Health insurance information The Importance of Compliance There are severe consequences to not abiding by the HIPAA rules. For example, imagine a hospital employee accidentally shares a patient’s medical records with someone who shouldn’t have seen them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Management in the Not-So-Distant Future of Health Care

AIIM

The classic example is the insurer that won’t pay for care that a doctor determines a patient needs. Today, if you have a computer, you have a doctor – videoconference doctor visits routinely complement in-person ones. Electronic Health Record. Almost all hospitals have adopted the Electronic Health Record (EHR).

article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

A prime example is the National Institute of Standards and Technology’s (NIST) cybersecurity frameworks , a comprehensive cyber hygiene roadmap applicable to businesses of all sizes and in all industries The trouble is the NIST guidelines are voluntary. Pre-COVID-19 security regimes aren’t valid anymore. Cyber hygiene isn’t difficult.

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

For example, an unlawful transfer of personal data outside of KSA can result in a criminal conviction and imprisonment. Some of these steps include: Conduct a data mapping exercise. The data mapping exercise will provide an organisation with a snapshot of how its data is collected and managed.

article thumbnail

Pennsylvania Supreme Court holds common law duty for employers extends to protecting sensitive employee information

Data Protection Report

Rather, the duty arises under the common law rule that when an actor takes an affirmative action, that actor must exercise reasonable care to protect others from an unreasonable risk of harm from such act. The duty is one to exercise reasonable care, which may be different depending on the size and resources of a particular company.

article thumbnail

What Counts as “Good Faith Security Research?”

Krebs on Security

Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. In a statemen t about the changes, Deputy Attorney General Lisa O.

Security 235