Protecting that tax data requires more than just HIPAA compliance. Separate breach reporting and data encryption rules apply, for example, and the IRS has some fairly specific rules for physical safeguards, including a prohibition on drop ceilings and prescriptions for cubicle wall heights where FTI is handled.
The online attacks launched against multiple banks, insurance companies and television stations in South Korea Wednesday knocked targeted networks offline. But according to security experts, the attacks were relatively unsophisticated and would have required little infrastructure or expertise to launch
Over the past three years, about 21 million patients have had their medical records exposed in data security breaches that were big enough to require they be reported to the federal government.
In April 16, 2011, meanwhile, the indictment said that Miller chatted with the undercover agent and said hed accessed two nersc.gov supercomputers owned by the National Energy Research Scientific Computer Center NERSC, which provides computer resources for the U.S. Department of Energy. In July 2011, authorities said that for $50,000, he offered to sell the undercover agent “login credentials to a series of computer networks that would enable remote access to the domain nersc.gov.”
many businesses see security as “an expensive add-on” and end up not paying sufficient attention to it. “So they’ll dual-hat their IT director and say he’s also doing IT security. And in some organizations–I call it the pile-on–they also pile the chief privacy officer (CPO) responsibilities onto the CIO or CISO role
As a result of the state’s review of the file loss, the hospital is forced to pay a $750,000 settlement. However, the true total is $475,000, which is the balance due based on the hospital’s pre-existing investment of $275,000 in technology, particularly data-handling upgrades. The remaining balance will go to enforcement payments ($250,000) and a data-security education fund ($225,000).
Corporations are starting to embrace technologies used to monitor employee Internet use, with 60 percent expected to watch workers social media use for security breaches by 2015, according to a new report from Gartner
Utah Department of Technology Services (DTS) reveals 780,000 individuals have been affected by the theft of sensitive Medicaid information. That’s far worse than initial estimates
MasterCard and Visa are warning banks about a possible security breach at a U.S.-based processor that could affect millions of credit-card holders
All companies storing personal data on Massachusetts residents have just over a month to ensure that their contractors, suppliers, technology providers and other third parties comply with a provision of a state data breach law that went into effect in March 2010