News & Analysis as of

Data Breach Mobile Devices Data Protection

Latest OCR Cybersecurity Newsletter Tackles Mobile Devices

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) released its October Cybersecurity Newsletter last week with a focus on mobile devices. Given the amount of work conducted on mobile devices...more

WhatsApp security flaw, lawsuit in Germany

Tobias Boelter, a University of California Berkeley cryptography researcher claims that last year he found a security flaw in WhatsApp’s encrypted smart phone messaging application. The flaw, which relates to the unique...more

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

by Dechert LLP on

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

Bad News for HIPAA Business Associates: HHS OCR Announces $650,000 Settlement for BA Breach

Catholic Health Care Services of the Archdiocese of Philadelphia (“CHCS”), a HIPAA business associate, has agreed to pay the Department of Health and Human Services Office of Civil Rights (“OCR”) $650,000 in connection with a...more

Alphabet Soup and Data Security

by Bilzin Sumberg on

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

by Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

[Webinar] Mobile Device Management for Health Care Organizations and Vendors - Sept. 10th, 10:00am PDT

In this webinar, we will demystify the HIPAA Security Rule and how to apply the administrative, physical, and technical safeguards in a mobile environment. We will discuss key takeaways from the recently released NIST Draft...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Data Security Issues in the Workplace: It’s 10:00 p.m. – Do You Know Where Your Company’s Data Is?

by Akerman LLP - HR Defense on

It seems that not a day goes by without another massive data breach incident providing fodder for the morning headlines or the evening news. That should come as no surprise. According to key studies, the average company...more

New NIST Guide Advises Healthcare Companies on Securing Patient Health Information on Mobile Devices

by Ballard Spahr LLP on

In response to a growing demand for cybersecurity guidance in the health care industry, the National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence, recently published a...more

FFIEC Cybersecurity Assessment Tool: Not Just For Financial Institutions

by LeClairRyan on

On June 30, 2015, the Federal Financial Institutions Examination Council (FFIEC) released its long anticipated Cybersecurity Assessment Tool (press release here). The FFIEC is a formal interagency organization empowered to...more

Is Creepy Compensable?

by LeClairRyan on

A watchful eye can be a good thing. We all want to keep an eye on what’s important. In an increasingly fast-paced world, however, it gets harder. The Internet and advances in mobile technology put so much information at our...more

FINRA settles data breach enforcement action

by Robinson & Cole LLP on

The Financial Industry Regulatory Authority (FINRA) agreed to settle its enforcement action with Sterne Agee & Leach, Inc. (Sterne) this week for $225,000. The enforcement action followed the loss of an unencrypted laptop by...more

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

by Poyner Spruill LLP on

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Enforcement of the Personal Data Protection Act in Singapore

by Latham & Watkins LLP on

The Personal Data Protection Commission (the “Commission’) was established in January 2013 to implement and enforce The Personal Data Protection Act 2012 (“PDPA”). The PDPA fully came into force on 2 July 2014. So far, the...more

Failure to Encrypt Mobile Devices = Nearly $2 Million in Settlements

by Cozen O'Connor on

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) settled for the collective amount of $1,975,220 with Concentra Health Services (Concentra) and QCA Health Plan, Inc. (QCA). The settlements stem...more

New rules for biometric data

by DLA Piper on

New rules on the usage of biometric data issued by the Italian data protection authority (the “Garante” or “DPA“) are meant to clarify the applicable obligations with the purpose to ease the adoption of technologies relying...more

BYOD: Where the Employee and the Enterprise Intersect

by Benesch on

The proliferation of bring your own device programs – or “BYOD” as it is commonly referred – has drastically changed today’s corporate workplace environment. Employees are availing themselves of smart phones, tablets, and...more

Ever Lost -- or Worse Yet, Had Stolen -- a Smart Phone, Laptop, Tablet, Etc.?

Many of us have been focused on cyber-security, especially in the wake of the recent data breaches over the holidays, among other things. Two Maryland Law Enforcement Officers are leveraging the power of social media and the...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

by Pepper Hamilton LLP on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

FTC and California Attorney General Issue Reports on Mobile Privacy

by Ballard Spahr LLP on

The Federal Trade Commission and the California Attorney General have recently published reports focused on mobile privacy. The FTC’s “Mobile Privacy Disclosures” staff report, released on February 1, 2013, followed the...more

Enough Already: Encrypt Those Portable Devices

by Dentons on

The U.S. Federal Trade Commission (FTC) announced on Data Privacy Day (January 28) that it had reached a settlement with a cord blood bank in respect of the loss of nearly 300,000 customers’ personal information. The lost...more

Why Medical Providers Should Take Caution with Sensitive Information, Especially With Mobile Devices

by Pullman & Comley, LLC on

We continue to hear reports of large-scale data breaches that involve the loss or theft of thousands of records containing personally identifiable information of individuals (PII). If such a loss or theft is determined to...more

32 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.