Colin J. Zick

Colin J. Zick

Foley Hoag LLP

Contact  |  View Bio  |  RSS

Latest Posts › Data Breach


Quick Thoughts About the Yahoo Breach

Another day, another 500 million Yahoo accounts reached. Our friends at the FTC are right on top of this with guidance for individuals with Yahoo accounts. First and foremost, change your Yahoo password....more

9/23/2016 - Breach Notification Rule Data Breach FTC Yahoo!

Bad News for HIPAA Business Associates: HHS OCR Announces $650,000 Settlement for BA Breach

Catholic Health Care Services of the Archdiocese of Philadelphia (“CHCS”), a HIPAA business associate, has agreed to pay the Department of Health and Human Services Office of Civil Rights (“OCR”) $650,000 in connection with a...more

7/5/2016 - Data Breach Data Protection HHS HIPAA Mobile Devices OCR PHI Risk Management Settlement

In Cybersecurity, No Harm Does Not Necessarily Mean No Foul

How much does the question of harm matter in cybersecurity law? The answer is: It depends on who is bringing the claim. Businesses confronting data breaches can face litigation from private consumers as well as from...more

2/18/2016 - Article III Clapper v. Amnesty International Cybersecurity Data Breach Enforcement Actions FTC v Wyndham Injury-in-Fact LabMD Neiman Marcus SEC Standing Unfair or Deceptive Trade Practices Wyndham

What is reasonable? The emerging legalities of cybersecurity post-Wyndham

This month’s edition of the Advanced Cyber Security Center’s newletter includes my discussion of lessons to be learned from the Wyndham decision: Historically, security was an issue reserved in a back room for the IT...more

10/1/2015 - Cyber Attacks Cyber Threats Cybersecurity Data Breach Data Collection Data Privacy Data Protection Data Security FTC FTC v Wyndham Hackers Identity Theft Personally Identifiable Information Privacy Policy SEC Unfair or Deceptive Trade Practices

HIPAA Compliant Technology and the Importance of Encryption

We welcome this guest blog by Gene Fry, Compliance Officer, Scrypt, Inc. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. This means that any...more

2/24/2015 - Business Associates Covered Entities Cybersecurity Data Breach Data Protection Electronic Medical Records Electronically Stored Information Encryption HIPAA HITECH PHI

Data Breach Prevention and Response: Avoiding Potential Pitfalls and Implementing Best Practices to Protect Your Company

In This Presentation: - Overview of data breach landscape - Data breach response ..Technical best practices ..Legal best practices - Data breach prevention ..Technical best practices ..Legal best...more

10/27/2014 - Best Management Practices Data Breach Data Protection Risk Assessment Risk Management

Key Elements of the New “Omnibus” HIPAA Privacy and Security Regulations

On January 18, 2013, nearly four years after the passage of the HITECH Act and its amendments to HIPAA, and nearly three years after it proposed regulatory amendments, the U.S. Department of Health and Human Services (“HHS”)...more

1/25/2013 - Business Associates Data Breach Data Protection Electronic Medical Records HIPAA HIPAA Omnibus Rule HITECH Patient Privacy Rights PHI

7 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.