News & Analysis as of

Protected Health Information Personal Data Department of Health and Human Services (HHS)

Robinson+Cole Data Privacy + Security Insider

Insight Into DOGE’s Access to HHS’ Systems

Becker’s Hospital Review reports that the Department of Government Efficiency (DOGE) “has access to sensitive information in 19 HHS databases and systems,” according to a court filing obtained by Wired. HHS provided the...more

Alston & Bird

More Guidance from HHS on Online Tracking Technologies but Questions Remain

Alston & Bird on

Health and Human Services (“HHS”) released updated guidance yesterday on the use of online tracking technologies (like cookies, pixels, software development kits (SDKs), etc.) by HIPAA Covered Entities (the “Updated...more

McGuireWoods Consulting

Biden Issues Executive Order to Protect Health Data from Exploitation by Foreign Countries

On Feb. 28, 2024, President Biden issued an executive order to protect sensitive personal data from exploitation by “countries of concern”. The order calls for actions that will likely lead to the development of regulations...more

J.S. Held

Litigation Surge From the Use of Tracking Technology & the Sharing of Healthcare and Personal Data

J.S. Held on

Introduction: Tracking Software in the Healthcare Industry - Privacy-related concerns have become increasingly prominent in recent years, especially with the widespread use of third-party tracking tools such as tracking...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2020 #3

Robinson & Cole LLP on

HHS Targeted by Nation-State Hackers - Evil doers know that the best time to attack is during a crisis or a time of vulnerability. As the United States, and specifically, the Department of Health and Human Services (HHS)...more

Foley Hoag LLP - Security, Privacy and the...

Partner Colin Zick Speaks to Bloomberg BNA about Cyberthreats and Healthcare Data

The federal government has identified two new cyberthreats that put patients’ personal data at risk for exposure. The threats, known as Spectre and Meltdown, exploit a vulnerability in many commercial computer chips...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide