Data breach

Results: 1224



#Item
511Security / Computer security / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Data breach / Privacy / Medical record / Health / Ethics / Data security

BUSINESS ASSOCIATES: KNOW YOUR RISK? GREATER SECURITY RISK More vendors are touching ePHI, therefore security risk is greater. 90% of covered entities have had at least one data breach in the past two years.1 Since 2009,

Add to Reading List

Source URL: www.vendormate.com

Language: English - Date: 2014-10-03 09:56:48
512Personal finance / Computer network security / Secure communication / Credit card / Identity theft / Equifax / Credit report monitoring / Computer security / United States Postal Service / Financial economics / Credit / Security

USPS Cyber Intrusion and Employee Data Compromise Updated Dec. 18, 2014 Employee Frequently Asked Questions 1. How and when did the security breach occur? The Postal Service recently learned of a cyber intrusion into som

Add to Reading List

Source URL: liteblue.usps.gov

Language: English - Date: 2015-01-12 09:01:10
513Money / Debit card / Credit card / Data breach / MasterCard / Target Corporation / Bank / Cheque / Debits and credits / Payment systems / Business / Finance

Microsoft Word - DOCS-#[removed]v1-Target_draft_current_8_25_consumer_complaint.docx

Add to Reading List

Source URL: assets.law360news.com

Language: English - Date: 2014-08-26 14:37:42
514Standing / Demurrer / Lawsuit / Class action / MERS / Cause of action / Negligence / Federal Rules of Civil Procedure / Doe v. MySpace / Law / Civil procedure / Tort law

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA In re: Target Corporation Customer Data Security Breach Litigation,

Add to Reading List

Source URL: assets.law360news.com

Language: English - Date: 2014-10-02 15:09:34
515Computer network security / Data breach / Secure communication / Identity theft / Personally identifiable information / Personal Data Privacy and Security Act / Security breach notification laws / Security / Computer security / Data security

Bulletin 345  NOTICE OF RISK TO PERSONAL DATA ACT  During its First Special Session, the 122nd Maine Legislature enacted the Notice of Risk to  Personal Data Act, P.L. 2005, c. 379, effecti

Add to Reading List

Source URL: www.maine.gov

Language: English - Date: 2014-12-24 10:25:29
516Privacy law / Privacy / Data privacy / Computer law / Data breach / Security breach notification laws / Identity theft / Computer Fraud and Abuse Act / Personally identifiable information / Security / Ethics / Computer security

SO YOU’VE BEEN NOTIFIED, NOW WHAT? THE PROBLEM WITH CURRENT DATABREACH NOTIFICATION LAWS Rachael M. Peters* Data breaches, now a common occurrence throughout the world, are an everpresent threat to both consumers and c

Add to Reading List

Source URL: www.arizonalawreview.org

Language: English - Date: 2014-11-29 22:06:31
517Crime / Computer network security / Data breach / Secure communication / Identity theft / Information security / Credit card / Phishing / Personally identifiable information / Security / Computer security / Data security

Data Breaches in Higher Education in the Last Year Fort Hays State University EDU DISC Hays, Kansas Fort Hays State University has notified 138 of its graduates that their personal

Add to Reading List

Source URL: www.adhe.edu

Language: English - Date: 2014-12-22 13:00:56
518Security / Computer network security / Computer security / Cyberwarfare / Identity theft / Identity Theft Resource Center / Fair and Accurate Credit Transactions Act / Data breach / Threat / Identity / Crimes / Theft

Vertical Overiview_Benefits | CID001-v1 GROUP BENEFIT PLANS ARX-ID Identity Theft Protection is an affordably-priced win-win addition to your benefit package.

Add to Reading List

Source URL: www.coreidservices.com

Language: English - Date: 2013-09-04 13:08:34
519Computer network security / Secure communication / Data security / Public safety / Computer security / Information security / Internet privacy / Data breach / Security / Crime prevention / National security

Tips for Updating Your Cybersecurity Program and How to Handle Breaches November 21, 2013 Anthony Hendricks, Associate [removed]

Add to Reading List

Source URL: www.crowedunlevy.com

Language: English - Date: 2013-12-04 13:45:17
520Computer law / Data Protection Act / Computing / Information privacy / Privacy / Ico / Ethics / Data privacy / Privacy law

[removed]Data protection breach notification form This form is to be used when data controllers wish to report a breach of the Data Protection Act to the ICO. It should not take more than 15 minutes to complete.

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2014-10-08 05:51:23
UPDATE