Latest Publications

Share:

NAIC Restarts Its Work Revising Its Model Privacy Provisions

After a brief hiatus due to COVID-19, the NAIC’s Privacy Working Group returned to work on May 5 discussing comments received on the working group’s markup of the NAIC Insurance Information and Privacy Protection Model Act...more

Five Steps to Prepare for Telehealth Data Breach Litigation

As we’ve previously reported, COVID-19 has caused a surge in telehealth and has temporarily reduced the HIPAA Security Rule requirements placed on telehealth service providers. ...more

10 Steps for Responding to a Telehealth Data Breach

Thus far, telehealth breaches have been exceedingly rare, but as telehealth is increasingly used, telehealth data breaches and similar incidents may become more commonplace. Here are 10 steps for responding to a telehealth...more

Six Steps to Protect Against Increased Telehealth Cybersecurity Dangers

Last week, the American Medical Association (AMA) and the American Hospital Association (AHA), recognizing the increased cybersecurity threats facing health care providers, issued joint guidance for physicians working from...more

OCIE Continues Relentless Cybersecurity Focus

The level of attention that the SEC’s Office of Compliance Inspections and Examinations has been giving to cybersecurity issues can hardly be overstated. ...more

Spring Cleaning on the NAIC Model Privacy Laws

Recognizing that the NAIC’s model consumer data privacy laws have not been revised since 2017, the NAIC Privacy Protections Working Group (Privacy WG) is dusting off the NAIC Insurance Information and Privacy Protection Model...more

Federal Reserve Moves to Assist Larger Businesses

The Federal Reserve has unveiled its $600 billion Main Street lending effort for businesses with up to 10,000 employees and up to $2.5 billion in 2019 annual revenue....more

Privacy and Cybersecurity Perils in Hastily Signed Work-From-Home Vendor Contracts

COVID-19 spurred an overnight surge in demand for work-from-home vendors. These include companies offering audio and videoconferencing services, cloud services, e-commerce platforms, and virtual desktop infrastructure, to...more

Cybersecurity Considerations for Providers Considering Telehealth During COVID-19’s State of Emergency

Until recently, telehealth made up a very small percentage of medical claims (less than 1% according to FAIR Health’s July 2019 white paper). But with the temporary loosening of telehealth restrictions, everyday providers are...more

3/23/2020

COVID-19 and Cybersecurity: Best Practices in an Uncertain Landscape

For many people and organizations, COVID-19 caused a rapid transition to remote learning and working; for hackers and other bad actors, it has created new opportunities. Whether by virtue of a remote and distracted workforce,...more

Here Are Seven Phrases That Can Help Your Business Avert Cybersecurity Attacks

It starts inconspicuously enough with an email. You’re busy, so without thinking, you quickly open it and view the attachment. You may have just compromised the security of your entire company and the privacy of every...more

62 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide