Posts Tagged ‘IT training’

2 More Things In History That Could Have Improved Infosec & Privacy

Wednesday, April 22nd, 2009

Late last week I blogged about a question I got while at InfoTec in Omaha last week, “2 Things In Computing History That Could Have Improved Information Security and Privacy“…

(more…)

Breach Notices, Securing PHI & PHR Vendor Responsibilities Under HIPAA/HITECH Act

Tuesday, April 21st, 2009

Last Friday the US Department of Health and Human Services (HHS) released, at the last possible moment to meet their deadline, their interim final regulations to require covered entities (CEs) under the Health Insurance Portability and Accountability Act (HIPAA) and their business associates (BAs) to provide for notification in the case of breaches of unsecured protected health information (PHI) as required by the HITECH Act.
If you’ve read any of the at least 47 U.S. state and territory beach notice laws you will get a strong sense of deja vu while reading this document. They borrowed HEAVILY from the various existing breach notice laws to estblished their proposed definitions of securing PHI, what constitutes a “breach” of PHI, and for doing breach notifications.
There are two major issues…

(more…)

HIPAA Requirements Changes & Business Associates Impacts From HITECH Act

Monday, April 20th, 2009

Last week I engaged in a very interesting tweetversation with David Mortman about when the U.S. Department of Health and Human Services (HHS) needs to get their guidance documents and rules published for the various HITECH Act requirements…

(more…)

HIPAA Requirements Changes & Business Associates Impacts From HITECH Act

Monday, April 20th, 2009

Last week I engaged in a very interesting tweetversation with David Mortman about when the U.S. Department of Health and Human Services (HHS) needs to get their guidance documents and rules published for the various HITECH Act requirements…

(more…)

2 Things In Computing History That Could Have Improved Information Security and Privacy

Friday, April 17th, 2009

This past Wednesday I gave a session at Infosec09 in Omaha, Nebraska.
What a great event and venue! If you get a chance to attend next year, I highly encourage you to do so.

(more…)

2 Things In Computing History That Could Have Improved Information Security and Privacy

Friday, April 17th, 2009

This past Wednesday I gave a session at Infosec09 in Omaha, Nebraska.
What a great event and venue! If you get a chance to attend next year, I highly encourage you to do so.

(more…)

“Secure Your ID Day” is April 18

Tuesday, April 14th, 2009

I’m in Omaha to speak tomorrow at the Infotec09 conference and I heard on the local news that “Secure Your ID Day” is April 18…

(more…)

“Secure Your ID Day” is April 18

Tuesday, April 14th, 2009

I’m in Omaha to speak tomorrow at the Infotec09 conference and I heard on the local news that “Secure Your ID Day” is April 18…

(more…)

Pointers to interesting & useful information security, privacy & compliance info

Monday, April 13th, 2009

I’ve been using Twitter for a couple of months now. I never saw the value of using Twitter before this time, and in fact had a completely different view of what it was “all about” until I actually started using it. I’m so glad I did! I’ve found it to be a very valuable communications tool, and I’ve made some wonderful new contacts and friends, from all over the world, through using it.

(more…)

You aren’t in Kansas anymore, ToTo…you’re in virtual Kansas!

Thursday, April 9th, 2009

Oh; and, by the way, what the heck are virtual worlds? Aren’t they something that only kids use?

(more…)