Remove Document Remove Encryption Remove Exercises Remove Insurance
article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

The stolen information allegedly included names and identifying information, hashed passwords, security questions and answers, family information, Social Security numbers, lab results, health insurance information, doctor’s names, and medical conditions, among other things.

article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. NYDFS: Setting a new bar for state cybersecurity regulation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

Entity Extraction that automatically identifies names, organizations, locations, dates, quantities and monetary value from contracts; Natural Language Processing (NLP) that helps organizations infer meaning from agreements in context by analyzing contract clauses and their relationships within and between documents. Want more information?

GDPR 83
article thumbnail

Regulatory Update: NAIC Spring 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Spring 2019 National Meeting (Spring Meeting) in Orlando, Florida, from April 6 to 9, 2019. ceding insurer could be eligible for the same reduced collateral requirements that would apply to qualifying EU reinsurers under the revised CFR Model Laws.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Virtual private networks (VPNs): Secure remote user or branch office access to network resources through encrypted connections to firewalls or server applications. Apply encryption protocols and other security measures to connections between computers. Communication protocols (TCP, HTTPS, etc.):

Security 120
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Related to that is the question of the restriction on data subjects’ rights in relation to processing data contained in documents relating to criminal investigations. Withdrawal from the EU means that we stand to lose the institutional platform from which we have exercised that influence. You could call it Macavity the cat.

GDPR 120
article thumbnail

Private cloud use cases: 6 ways private cloud brings value to enterprise business

IBM Big Data Hub

A private cloud also provides an ideal setting for companies with workloads that deal with confidential documents, intellectual property, personally identifiable information (PII) , medical records, financial data or other sensitive data. High security: Certain industries, like insurance, are more prone to data breaches and cyberattacks.

Cloud 98