Tags » Breach Notification

The Difficulties with Breach Notification Timelines

From the 2015 PLUS Conference session “Handling Cross-Border Data Breaches,” Theodore Kobus III, Esq. (BakerHostetler), Paul Nikhinson (Beazley), and Catherine Mulligan (Zurich North America) discuss the different time frames for breach notification between states in the U.S., and between the U.S., Europe and Brazil. 69 more words

International Conference

Why Cybersecurity Incidents Are Legal Events

In this video, cybersecurity and data protection attorney Shawn Tuma explains why cybersecurity incidents are as much legal events as they are information technology and business / public relations events. 60 more words

Data Breach

February 29th is the Deadline to File HIPAA Annual Breach Notifications for 2015

  • No later than 60 days after the end of the calendar year, covered entities must report information to HHS regarding the prior year’s HIPAA breaches involving less than 500 individuals.
  • 405 more words
Compliance & Ethics

Health Insurance portability and accountability act

How will your information remain private?

This new Form of strict electronic transactions are conducted through designated care providers, with the addition of limited dis-closers. In addition to providing patients with new rights to access personal health records. 130 more words

Breach Notification

Honor Among Business Associates

Question

How long do you think it will take before you find out a business associate had a breach and decided not to report it? 504 more words

Business Associate Risk Management

SecureWorld Webinar: Data Protection Pitfalls to Avoid

You are welcome to attend a complimentary SecureWorld webinar with these featured presenters:

  • Aliki Liadis-Hall, Director of Compliance, North American Bancard
  • Jason Hart, CTO of Data Protection, Gemalto…
  • 68 more words
Data Breach

Cover the Basics for Securing Your Network -- Shawn Tuma's Book Contribution

Shawn Tuma authored a section for an eBook published by Fortinet Security. You can read Tuma’s section, Cover the Basics, as well as download the complete eBook at this link: … 9 more words

Data Breach