No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Podcast: Interoperability: A New Vision Through openEHR - Diagnosing Health Care
Podcast–Interoperability: How Far We’ve Come and Where We’re Going - Diagnosing Health Care
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
Inside Privacy Law: The Regulation of Personal Data
Oklahoma: Changing Data Privacy as We Know It?
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
Healthcare Tech: How Are Licensing Agreements Bridging the Industry Divide?
Compliance Perspectives: The Ethics of Data
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
From NC State to Changing the State of Health Information Networks, with Medicom Technologies’ Malcolm Benitz
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Global privacy in the age of COVID-19
Compliance Perspectives: Permissible Disclosures under HIPAA, Especially in the Time of COVID-19
Compliance Perspectives: COVID-19 and GDPR
Jones Day Presents: Antitrust, Collusion, and Blockchains
[WEBINAR] Laying the Foundation for Maximizing Benefits Around Emerging Technologies
The European Supervisory Authorities have published a joint report on the feasibility of further centralization of the reporting of major ICT-related incidents by financial entities to competent authorities. The ESAs' joint...more
The Digital Operational Resilience Act (DORA) is an EU regulatory framework, aimed at enhancing the financial sector’s ability to withstand and recover from ICT (information and communication technology) disruptions....more
In a recent blog post, the FTC again cautioned entities that hashing data does not make that data anonymous. Hashing is a process that takes a particular input, such as a phone number or email address, and uses a mathematical...more
The Federal Acquisition Regulatory (FAR) Council on Oct. 3, 2023, issued two proposed rules to partially implement President Biden's Executive Order on Improving the Nation's Cybersecurity. The first proposed rule imposes...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Industry stakeholders have been eagerly waiting for the U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) and the Secretary of HHS to provide more clarity on federal information blocking...more
There have been several recent governmental actions which highlight the balance between securing electronic patient information and the need for interoperability and appropriate exchange of such information. This article will...more
Recent findings by the Office of the Privacy Commissioner of Canada (“OPC”) found that Home Depot of Canada Inc. (“Home Depot”) did not obtain valid meaningful consent to share summary purchase information with Meta Platforms...more
As we all try to keep up with the Metaverse and as the healthcare system wilts under a data deluge, the convergence of realities in a shared online space is not merely a chance for practitioners and patients to find each...more
The 21st Century Cures Act directed the National Coordinator to “develop or support a trusted exchange framework, including a common agreement among health information networks nationally.” Fulfilling that mandate, the Office...more
On December 11, 2020, the Centers for Medicare and Medicaid Services (CMS) issued a proposed rule designed to improve electronic health care data exchange and streamline the prior authorization process....more
After undergoing several rounds of revisions to the 2019 draft specifications, the new Information Security Technology-Personal Information Security Specifications (GB/T35273-2020) (New Personal Information Specifications)...more
In this week’s episode, Ryan Severson discusses the Federal Health IT Strategic Plan, which was recently released by the Office of the National Coordinator for Health Information Technology (“ONC”). Mr. Severson discusses...more
Some app developers know more about our health than our doctors do. Take, for instance, FitBit, which is attached to our wrist and measuring in real time our temperature, our heart rate, our steps and whether we have had...more
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
Maine Bill Requires ISPs to Obtain Opt-In Consent from Customers - The Maine legislature has passed a bill that requires internet service providers (ISPs) operating in Maine to obtain express, affirmative consent from...more
We had been following on this blog the heated debates around the proposed EU Copyright Directive. These debates now belong to history since on March 27, 2019, the European parliament adopted the Directive with 348 votes...more
On 13 February 2019 the Commission, the European Parliament and the Council finally agreed the text of the long-awaited draft Copyright Directive (COM(2016)593) (“Directive“). ...more
On December 4, 2018, the New York Attorney General (NYAG) announced that Oath Inc., which was known until June 2017 as AOL Inc. (AOL), has agreed to pay a $4.95 million civil penalty to settle allegations that AOL’s ad...more
On December 29, 2017, the Standardization Administration of China, jointly with the PRC General Administration of Quality Supervision, Inspection and Quarantine, issued the Information Security Technology – Personal...more
Just days after the summit between the U.S. and North Korea, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security issued a warning about a malicious malware, a Trojan malware variant known as...more
CYBERSECURITY - South Carolina Enacts Insurance Data Security Act - South Carolina Governor Henry McMaster signed the South Carolina Insurance Data Security Act into law on May 3, 2018. The law, parts of which become...more