article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

The Health Insurance Portability and Accountability Act (HIPAA) ensures individuals’ health data protection and privacy. This includes insurance companies, nurses, and doctors. Healthcare organizations can face steep penalties and serious damage to their reputation if they don’t meet the HIPAA’s requirements.

article thumbnail

List of data breaches and cyber attacks in October 2018 – 44,701,278 records leaked

IT Governance

The representative did a “visual review” of the buckets, as USPS’s internal policy is not to plug any USB sticks into a computer (not all bad practice, eh?), Social insurance numbers. Despite the board’s instructions, a few days after the meeting someone authorised a bitcoin payment worth more than $20,000. Internal land claims.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in October 2018 – 44,701,278 records leaked

IT Governance

The representative did a “visual review” of the buckets, as USPS’s internal policy is not to plug any USB sticks into a computer (not all bad practice, eh?), Social insurance numbers. Despite the board’s instructions, a few days after the meeting someone authorised a bitcoin payment worth more than $20,000. Internal land claims.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. Covering all computers and file cabinets in plastic sheeting. . The plan was to meet the insurance coordinator at the Howard Avenue office at 8:30 a.m. Stabilizing or Moving.

article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Another common name for the IoB is embodied computing , where the human body is used as a technology platform. Wearable technology began as any kind of electronic device designed to be worn on the user’s body. A digital assistant like Alexa for Business can check the calendar, add meetings, and help locate the nearest meeting room.

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

O’Hara denied the plaintiff’s motion for sanctions based on the defendant’s alleged spoliation of a surveillance video that shows an altercation between the plaintiff and her supervisor, stating that “plaintiff has failed to meet the requirements of Fed. Case Background. Judge’s Ruling.

article thumbnail

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.