A recent Gartner report has identified what it believes to be the Top 10 Cyber Security Technologies for the future to assist businesses with combating cyber crime....more
Our predictions that the Office for Civil Rights (OCR) will become more aggressive with audits, investigations, and fines against HIPAA business associates has come true.
On June 24, 2016, the OCR announced that it has...more
7/6/2016
/ Business Associates ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Audits ,
HIPAA Breach ,
HITECH Act ,
Investigations ,
Mobile Device Management ,
Mobile Devices ,
OCR ,
PHI ,
Settlement Agreements
Passwords are a pain to keep track of and it is well known that consumers use the same password for multiple platforms because none of us can remember multiple complex passwords. When a hacker obtains one password, they can...more
Patterson Dental Supply, Massachusetts General Hospital’s (MGH) vendor that provides software to the hospital to manage dental practice information, has reportedly admitted that approximately 4,300 of MGH’s patient records...more
The Federal Trade Commission (FTC) issued an alert this week reminding businesses that the Telemarketing Sales Rule (TSR) amendments that went into effect in November of 2015, prohibit telemarketers from using three types of...more
Last week, the IRS announced that the electronic filing personal identification number tool (e-file PIN), used by taxpayers to verify their signature on their tax filings, “is no longer available.”...more
When I train clients’ employees on data privacy and security, I always mention the microphone on smartphones. They are powerful and if you allow apps access to your microphone, they can listen to every one of your...more
On June 15, 2016, the U.S. Department of Commerce’s National Telecommunications and Information Administration (NTIA) issued its facial recognition best practices, which were developed by a multi-stakeholder group convened by...more
On February 9, 2012, Robert Bishop was arrested and charged with one count of cyberbullying under the North Carolina Cyberbullying statute, which states that it is “unlawful for any person to use a computer or computer...more
6/27/2016
/ Cyberbullying ,
Facebook ,
First Amendment ,
Fourteenth Amendment ,
Free Speech ,
Harassment ,
NC Supreme Court ,
Social Media ,
Social Networks ,
Students ,
Text Messages
Following the issuance of Plymouth University Maritime Cyber Threats Research Group study on the risk of cyber threats, the International Maritime Bureau (IMB) recently issued a warning to shipping and maritime companies to...more
The World Energy Council recently warned the utility industry that one of the top threats to the energy sector is advanced malware attacks. The warning noted that the utility sector is vulnerable because of the size of the...more
Governor Bruce Rauner signed several new provisions into law amending Illinois’ Personal Information Privacy Act, including health insurance and medical information into the definition of personal information that triggers...more
Huh? What is a dashcam app?
A dashcam app uses a smartphones on the dashboard of a car to record traffic accidents, cars running red lights and bad drivers causing accidents. Dashcams can detect hard braking and can...more
The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more
On June 9, 2016, Governor Dannel Malloy, who continues to show his commitment to data privacy, signed An Act Concerning Student Data Privacy into law, effective October 1, 2016.
The law requires any local or regional...more
The results of a Raytheon commissioned Ponemon study released on June 7, 2016 shows that at least two-thirds of businesses wait until they have experienced a cyber-attack or data breach to hire and retain security vendors to...more
We previously reported that model aircraft hobbyist John Taylor filed suit against the Federal Aviation Administration (FAA) challenging the requirement to register with the FAA in order to fly his model aircraft near his...more
Although the IRS has warned taxpayers on multiple occasions about IRS phone scams, consumers continue to be victims. A lucrative scam for years, which according to the IRS, has cost victims more than $26 million since 2013,...more
We have kept abreast of the security vulnerabilities of cars that have been exposed by security researchers. This time, researchers are asking Mitsubishi to recall approximately 100,000 Outlander hybrid vehicles as they were...more
Cat product service provider KitNipBox sued rival Meowbox in federal court in Washington alleging that Meowbox hacked into KitNipBox’s website to steal its trade secrets and confidential information and to disrupt its...more
6/14/2016
/ Civil Conspiracy ,
Confidential Information ,
Cyber Attacks ,
Cyber Crimes ,
ECPA ,
Electronic Communications ,
Hackers ,
Tortious Interference ,
Trade Secrets ,
Trademark Infringement ,
Unfair Competition ,
Unjust Enrichment ,
Websites
Genetic information is basically one’s DNA sequence, which includes health information and genetic information about the individual and their family. It is at the core of one’s individual privacy, as well as providing...more
Complete Chiropractic & Bodywork Therapies, located in Ann Arbor, Michigan, recently notified 4,082 patients that its server, which contained the electronic medical record and billing information of patients, was infected...more
The U.S. Department of Homeland Security Computer Emergency Readiness Team (US-CERT) recently issued an alert to the public about a vulnerability in old software developed by SAP SE that cyberattackers are using to infiltrate...more
A representative of Honeywell Process Solutions (Honeywell), which provides cybersecurity services for over 400 industrial sites worldwide, recently commented publicly that Honeywell is seeing an increase in nation-state and...more
Recently, a federal judge in Georgia ruled that the class action filed against Home Depot by the credit card companies could proceed. The judge stated that the card issuers’ allegations that Home Depot was negligent in its...more