Science, Computers & Technology Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

WEBINAR: Preparing for the HITECH September Deadline - Tips for Negotiating Effective Business Associate Agreements under HIPAA

Business Associate Agreements (BAAs), in the current regulatory and technological environment, require careful review and negotiation of the implementation of the regulatory requirements. In meeting the September 23, 2014...more

Worn on the Sleeve

Watches that monitor sleep quality. Skullcaps that gauge head injury. An infant bodysuit that sends temperature and breathing updates to a mobile device. Ear buds that track your heart rate. These are just some of the...more

Capital Thinking: Cybersecurity

Legislative Branch Activity - House Cybersecurity Legislation - This week, the House will consider four pieces of cybersecurity legislation on the floor including the National Cybersecurity and Critical...more

Recent OCR Reports Illustrate Past and Future Compliance and Enforcement Efforts

Daily news stories about data breaches and enforcement actions seem to be the new norm, so it’s no surprise that people may start to believe that hackers have won the war and that no personal health information is safe. But...more

California Court of Appeal Rules Damages Are Unavailable To Plaintiff Patients Where Patient Information On Stolen Computer Was...

Until last week, Sutter Health was looking at a potential jury verdict in excess of $4 billion against several of its affiliated hospitals in a class action suit filed under the California Medical Information Act, California...more

OCR to Begin Phase 2 of HIPAA Audit Program

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) will soon begin a second phase of audits (Phase 2 Audits) of compliance with Health Insurance Portability and Accountability Act of 1996 (HIPAA)...more

House of Representatives Passes SAFETY Act Amendment

The U.S. House of Representatives took a major positive step towards increasing the nation’s cyber security posture today when, on a voice vote, it passed H.R. 3696, the “National Cybersecurity and Critical Infrastructure...more

Appellate Court Rules Medical Information Must Actually Have Been Viewed by an Unauthorized Person for a Plaintiff to Recover...

The California Court of Appeal recently held that in order to recover under California’s Confidentiality of Medical Information Act (CMIA), Civ. Code §§ 56 et seq., a plaintiff must plead and prove that the “stolen medical...more

Privacy Tuesday: July 2014 #4

The last Tuesday in July — the summer of 2014 is rapidly slipping away! Here are some privacy and security bits and bytes for this last week of July...more

Florida Information Protection Act of 2014 - Florida Means Business When It Comes to Protecting Customers' Personal Information

On June 20, 2014, Governor Rick Scott signed into law the Florida Information Protection Act of 2014 ("FIPA"), which became effective July 1, 2014. FIPA expands the obligations of businesses and government entities that...more

California Court Dismisses Data Breach Class Action

Last week, the California Third District Court of Appeal dismissed what may have been the largest health data breach class action in history. Consistent with a trend of similar dismissals, the California state appellate court...more

It’s No Surprise: Health Care Data Breaches Are on the Rise and So Is Government Enforcement

In This Issue: - The Take-Aways for Covered Entities and Business Associates - For More Information - Excerpt from The Take-Aways for Covered Entities and Business Associates: As a majority of the...more

Rhode Island Hospital Reaches Settlement with Massachusetts AG to Resolve Data Security Allegations

Last week, Women & Infants Hospital of Rhode Island (“W&I”) reached a settlement with the Massachusetts Attorney General to resolve allegations that W&I failed to adequately protect personal data stored on unencrypted backup...more

Mobile Application: Security Best Practices

The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more

Sourcing Reference Guide: A reference tool for customers and service providers explaining current best practice and thinking from...

Outsourcing and the New Australian Privacy Law: In a nutshell - In Australia all APP Entities which collect, use or disclose Personal Information must, under the Privacy Act 1988 (Cth) (“Act”), take reasonable steps...more

The Internet of Things: Ofcom call for input

Ofcom has issued a call for stakeholder input on the emerging Internet of Things. The Internet of Things describes the inter-connection of multiple “things”, be they devices or sensors, that are able to communicate and share...more

Status Updates - July 2014 #12

..Your tax dollars at work: Wikipedia placed a 10-day ban on changes to the collaborative encyclopedia from a certain IP address inside the U.S. Capitol after discovering that bizarre and embarrassing edits were being made...more

Congress Putting Microscope on FTC Enforcement

On July 24, 2014, the House Committee on Oversight and Government Reform held a hearing entitled, "The Federal Trade Commission and Its Section 5 Authority: Prosecutor, Judge and Jury." The purpose of the hearing was to...more

Advertising Law - July 2014 #3

Suit Seeks To Include E-Mail Address Under Song-Beverly Protections - First zip codes, now e-mail addresses? According to a new complaint filed in California federal court against Express Fashion Apparel, LLC,...more

Status Updates - July 2014 #11

..Facebook reported strong results for ad revenue in the second quarter of 2014. Mobile advertising was particularly strong, up 30 percent from last year. Mobile ads now account for 62 percent of Facebook’s advertising...more

Executive Order on Drone Privacy Expected

The Obama Administration informed various sources that President Obama plans to issue an executive order to develop privacy guidelines for using commercial unmanned aerial systems (UAS) - also referred to as drones....more

Are your HIPAA ducks in a row? The next round of OCR HIPAA audits is approaching

In 2011 the Department of Health and Human Services’ Office for Civil Rights (OCR) established the HIPAA Pilot Audit Program to ensure compliance with HIPAA’s privacy, security and breach notification rules. The first...more

e-IDs: the Future of Secure Digital Identification?

Over the past decade, the EU has made significant technological and legal strides toward the widespread adoption of electronic identification cards. An electronic ID card, or e-ID, serves as a form of secure identification...more

Cyber Security: Forewarned is Fair-Warned

When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more

California Appellate Court Requires Actual Viewing of Confidential Information in Data Breach Case Under the California Medical...

In a case against Sutter Health involving records from a stolen office computer, the California Court of Appeal recently issued a decision limiting plaintiffs’ ability to state a claim and obtain statutory damages under the...more

3,432 Results
|
View per page
Page: of 138

Follow Science, Computers & Technology Updates on: