Data breach

Results: 1224



#Item
711Computer security / Medicaid / Security / Data privacy / Medicare / Government / FTC Fair Information Practice / Data breach / Data sharing / Federal assistance in the United States / Healthcare reform in the United States / Presidency of Lyndon B. Johnson

APCD Release Version2.0 – Application Published[removed]   Commonwealth of Massachusetts Center for Health Information & Analysis (CHIA) Government Agency Application for Data

Add to Reading List

Source URL: www.mass.gov

Language: English - Date: 2014-07-09 14:06:26
712Crimes / Identity / Identity theft / Theft / United States Department of Veterans Affairs / Data breach / Credit card fraud / Veteran / Experian / Financial economics / Credit / Security

F A Qs FOR IMMEDIATE RELEASE May 22, 2006 Frequently Asked Questions on VA’s Letter to Veterans 1- I’m a veteran, how can I tell if my information was compromised?

Add to Reading List

Source URL: www.nvti.ucdenver.edu

Language: English - Date: 2006-05-23 08:50:10
713Identity theft / Theft / Computer security / Data security / Data breach / Personally identifiable information / Security / Crimes / Identity

PDF Document

Add to Reading List

Source URL: files.painteractive.org

Language: English - Date: 2011-04-05 14:27:24
714Ethics / Public safety / Cloud computing / Insurance / Information security / Risk management / Internet privacy / Bring your own device / Data breach / Security / Computer security / Data security

Nonprofit Risk Management Center Vol. 22, No. 1, Spring[removed]Risk SUMMIT

Add to Reading List

Source URL: www.nonprofitrisk.org

Language: English - Date: 2013-05-13 13:01:38
715Ethics / Public safety / Crime prevention / National security / Computer network security / Personally identifiable information / Information security / Privacy / Data breach / Security / Data security / Computer security

Mandatory Data Breach Notification Author: Issue Date: Aarron Spinley – Sense of Security Pty Ltd Southern Region Business Manager

Add to Reading List

Source URL: www.senseofsecurity.com.au

Language: English - Date: 2013-05-24 03:38:51
716Data breach / Cyberwarfare / Judicial remedies / Security / Damages

If you feel you have damages as a result of the March 2012 data breach at the Department of Health, the Governmental Immunity Act, Utah Code Ann. 63G[removed]et seq. requires that for state claims you must file a claim wit

Add to Reading List

Source URL: www.healthpolicyproject.org

Language: English - Date: 2012-05-15 13:49:35
717Ethics / Privacy / Health Insurance Portability and Accountability Act / Computer security / Confidentiality / Security breach notification laws / Security / Privacy law / Data privacy

This is a sample of the Business Associate Agreement that the successful bidder will be asked to sign. Please provided and track any deviations you would propose to this contract and submit it with your bid. Appendix M

Add to Reading List

Source URL: www.nd.gov

Language: English - Date: 2014-10-30 09:18:33
718Ethics / Financial institutions / Institutional investors / Types of insurance / Data breach / Insurance / Information security / Credit card / Privacy / Security / Computer security / Data security

Mortgage Impairment / Mortgagee’s Errors & Omissions insurance – Frequently Asked Questions

Add to Reading List

Source URL: www.indianamba.org

Language: English - Date: 2013-02-25 17:38:17
719Computer network security / Secure communication / Cyberwarfare / Data security / Identity theft / Data breach / Cyberterrorism / Computer security / Cyber-security regulation / Computer crimes / Security / Crime

CYBER RISKS: THE GROWING THREAT JUNE[removed]Robert P. Hartwig, Ph.D., CPCU

Add to Reading List

Source URL: www.iii.org

Language: English - Date: 2014-06-27 11:56:24
720Data security / Email / Internet privacy / Health Insurance Portability and Accountability Act / Privacy law / Data breach / Information security / Privacy / Protected health information / Security / Computer security / Computing

Email Encryption The Case for Email Encryption Improve Compliance and Protect PHI on the Move Healthcare organizations face an ongoing compliance burden involving

Add to Reading List

Source URL: www.zixcorp.com

Language: English
UPDATE