News & Analysis as of

Health Insurance Portability and Accountability Act (HIPAA) Information Security

J.S. Held

What is an Information Security Framework and Why Do I Need One?

J.S. Held on

An information security framework, when done properly, will allow any security leader to more intelligently manage their organization's cyber risk. The framework consists of a number of documents that clearly define the...more

Kelley Drye & Warren LLP

The FTC is Not the Only One Tracking Your Use of Health Information

The FTC has made news recently with its recent enforcement activity regarding companies’ alleged disclosures of consumer health data, as detailed in our recent post FTC to Advertisers: We’re tracking Your Use of Health...more

Society of Corporate Compliance and Ethics...

[Webinar] Security Compliance at Scale - December 13th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Learn the technical dos and don’ts in implementing security compliance frameworks such as SOC 2, ISO 27001 and HIPAA - Discussion about why security compliance is so critical for organizations...more

Holland & Hart - Health Law Blog

HIPAA, Business Associates, and the Conduit Exception

The HIPAA privacy and security rules impose significant requirements on covered entities and their business associates; violations may result in penalties ranging from $119 to $59,522 per violation. (45 CFR § 160.404; 45 CFR...more

Steptoe & Johnson PLLC

Office for Civil Rights Recommends IT Asset Inventory

Steptoe & Johnson PLLC on

In its Summer 2020 Cybersecurity Newsletter, the U.S. Department of Health & Human Services Office for Civil Rights (OCR) expressed a concern that organizations lacked sufficient understanding as to the location of their...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Cohen & Gresser LLP

Protecting Employees From COVID-19 Without Violating Their Privacy Rights

Cohen & Gresser LLP on

A common response to widespread disease has always been to avoid contact with others until the disease runs its course. Many states adopted that approach to combat the COVID-19 outbreak by implementing stay-at-home orders,...more

Ballard Spahr LLP

Planning for the Worst: Privacy, Info Sec, and Bankruptcy

Ballard Spahr LLP on

With the ongoing covid crisis leaving businesses of all sizes concerned about the short and medium term future, the intimidating task of considering a liquidation or restructuring is inevitably starting to become a reality. ...more

Health Care Compliance Association (HCCA)

[Event] March Privacy Compliance Academy - March 9th - 12th, San Diego, CA

Dive into a broad spectrum of topics affecting healthcare organizations. Explore the latest laws, regulations, and developments to help you effectively manage your organization’s privacy compliance program. Our Academies are...more

Moore & Van Allen PLLC

Happy Data Privacy Day! A Few Tips from the MVA Privacy and Data Security Group

Moore & Van Allen PLLC on

Saturday January 28, 2017 is Data Privacy Day. The Moore & Van Allen Privacy and Data Security group took a break from the pre-holiday revelries to put together some thoughts and tips for DataPoints. So hoist a glass and...more

Kilpatrick

Swarming Regulation of Personal Data in the US Tech Sector

Kilpatrick on

Sectoral regulation of privacy and information security in the United States has created a complex system for tech innovation, because new products and services transcend the traditional sectoral boundaries and because...more

Brooks Pierce

What's So Great About an Information Security Policy?

Brooks Pierce on

Lawyers and compliance professionals constantly tout the importance of internal information security policies, particularly in light of data privacy problems that are reported almost daily in the media. Admittedly, drafting...more

Robinson+Cole Data Privacy + Security Insider

Security Frameworks 101: Which is Right for my Organization?

These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that their security profile is adequate. It can certainly help to...more

Pillsbury - Global Sourcing Practice

Under the Thumb: Regulatory Compliance When Outsourcing Cybersecurity Management

Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more

Smith Anderson

How To Catch-Up in a Revised HIPAA World

Smith Anderson on

The HIPAA final omnibus rule (Omnibus Rule) made sweeping changes to the HIPAA Privacy, Security, Breach Notification and Enforcement Rules earlier this year. Although the compliance deadline of September 23, 2013 has come...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide