News & Analysis as of

Data Theft Personally Identifiable Information

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Baker Donelson

Fraudulent Unemployment Claims on the Rise: What Should Employers Do?

Baker Donelson on

Government agencies are grappling with the theft of millions of taxpayer dollars through unique fraud schemes directed at state unemployment programs. Employers often are the first to discover these schemes when they learn...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 20, Number 11. Privacy Briefs: November 2020

Report on Patient Privacy 20, no. 11 (November 2020) - HHS Office of the National Coordinator (ONC) for Health Information Technology (ONC) is giving health care organizations more time to meet new rules on information...more

NAVEX

5 Ways National Cybersecurity Month Is Like Halloween

NAVEX on

October is best known for Halloween, but October also happens to be National Cybersecurity Awareness Month. It’s a time to focus on how cybersecurity is a shared responsibility, and we all must work together to protect and...more

Shumaker, Loop & Kendrick, LLP

Client Alert: The OCR Gives Practices 1.5 Million Reasons to Prioritize HIPAA Compliance

Today the Office of Civil Rights (OCR) at the U.S. Department of Health and Human Resources announced that a Georgia orthopedic clinic agreed to pay $1.5 million and adopt a two-year corrective action plan to settle potential...more

The Volkov Law Group

Lessons Learned from the Capital One Data Breach (Part I of III)

The Volkov Law Group on

Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of  all significant data breaches or cyber-incidents occur because of internal actors. ...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 5: Create a Data Theft Recovery Plan

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #198: Cybersecurity for Tax Professionals

This week, I was honored to again have the opportunity to participate as a speaker at the Internal Revenue Service’s Nationwide Tax Forum 2019 in Washington, D.C. Through a generous grant provided by the American Coalition...more

Sheppard Mullin Richter & Hampton LLP

HIPAA Breach Results in a $4,500,000 Class Action Settlement

Community Health System, one of the largest health systems in the United States, has agreed to pay $4,500,000 to settle claims made against it arising from a 2014 data breach. The data breach, believed to be caused by malware...more

Holland & Knight LLP

Impact of the New Health Industry Cybersecurity Practices: 2019 Outlook

Holland & Knight LLP on

• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more

Bowditch & Dewey

Client Alert – Employers Beware: ‘Tis the Season for Data Theft

Bowditch & Dewey on

Because cybercriminals don’t take holidays, December is an appropriate time for all employers to take steps to protect tax data and identities (both their own and their employees’) in advance of the 2019 tax-filing season....more

Mintz - Privacy & Cybersecurity Viewpoints

D.C. Circuit Holds Cyber-Theft of Customers’ Medical Identifying Information Created Sufficient Increased Risk of Harm to...

Earlier this month, an appellate panel of the federal DC Circuit unanimously held that individuals affected by a healthcare insurer’s data breach in 2014 could pursue claims against the insurer stemming from the cyberattack....more

Robinson+Cole Data Privacy + Security Insider

Hacker arrests and prosecutions update

We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more

Morrison & Foerster LLP

China Promulgates Tougher Criminal Provisions Governing Data Privacy

One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more

King & Spalding

OPM Faces Another Class Action For The Theft Of Data Affecting 21.5 Million Current, Former And Prospective Government Employees

King & Spalding on

On August 14, 2015, a class action was filed in the United States District Court for the District of Columbia on behalf of about 21.5 million federal employees, contractors, and job applicants whose personal information was...more

Tucker Arensberg, P.C.

FTC and Accretive Health Settle Unfair Business Practice Complaint Centered on Data Security Measures

Tucker Arensberg, P.C. on

Accretive Health recently agreed to settle a Federal Trade Commission (FTC) complaint that stems from a July, 2011 incident in which an Accretive employee’s laptop was stolen from his car. As a medical billing and revenue...more

Mintz - Privacy & Cybersecurity Viewpoints

FCC: Carriers Must Protect Certain Data Collected on Mobile Handsets

Aiming to “address the real privacy and security risks that consumers face when telecommunications carriers use their control of customers’ mobile devices to collect information about their customers’ use of the network,” the...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide