Search for: "Technical Security Integration, Inc."
Results 141 - 160
of 311
Sort by Relevance
|
Sort by Date
12 May 2017, 8:58 am
Celebration Cruise Operator, Inc., 2016 U.S. [read post]
26 Apr 2017, 6:14 pm
Assess whether its existing security measures are sufficient to protect its ePHI and revise its Risk Management Plan, Policies and Procedures, and training materials and implement additional security measures, as needed. [read post]
10 Apr 2017, 12:22 pm
In this piece, I first critique elements of their proposal, and then recommend a different direction for setting cyber policy efforts—one rooted in a technical background—along with a new proposal for limiting our systemic risk in the financial arena based on existing practice among technical practitioners of offensive information security. [read post]
6 Apr 2017, 4:00 am
Michael Maschke, CEO of Sensei Enterprises, Inc. [read post]
27 Mar 2017, 9:33 am
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
20 Mar 2017, 11:03 am
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
1 Mar 2017, 4:00 am
No reason of public policy or legal integrity required that result. [read post]
27 Oct 2016, 8:48 am
The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on… [read post]
21 Oct 2016, 5:32 pm
About Solutions Law Press, Inc. [read post]
2 Oct 2016, 6:27 am
Allard’s repeated offers of financial and technical assistance. [read post]
29 Sep 2016, 9:56 am
About the Crypto Policy Project Encryption helps human rights workers, activists, journalists, financial institutions, innovative businesses, and governments protect the confidentiality, integrity, and economic value of their activities. [read post]
24 Jun 2016, 10:18 am
Resource Investments, Inc. v. [read post]
16 Jun 2016, 2:48 pm
The same goes for data security incidents. [read post]
9 Jun 2016, 5:51 am
See also A & M Records, Inc. v. [read post]
17 May 2016, 10:42 am
This rule is applied with equal force by the Court of Federal Claims, L-3 Communications Integrated Systems, L.P. v. [read post]
17 Apr 2016, 8:27 am
I recently had the privilege of speaking about the Trans-Pacific Partnership (TPP) at the Fordham 24th Annual Intellectual Property Law and Policy Conference, a stellar international IP conference. [read post]
14 Apr 2016, 7:45 am
BLE’s key features also include an industry-standard wireless protocol that facilitates multi-vendor interoperability including connectivity with the large volume of Bluetooth devices on the market; adaptive frequency hopping; fast connections; a standardized application development architecture that leads to low development and operational costs; and enhanced security with 128-bit AES data encryption. [read post]
13 Apr 2016, 4:55 pm
” On March 3, meanwhile, the FBI’s cyber division issued a Private Industry Notification, warning law firms that “in a recent cyber criminal forum post, a criminal actor posted an advertisement to hire a technically proficient hacker for the purposes of gaining sustained access to the networks of multiple international law firms,” Bloomberg reports. [read post]
22 Mar 2016, 6:57 am
OCR’s investigation discovered that Feinstein’s security management process was limited in scope, incomplete, and insufficient to address potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI held by the entity. [read post]
22 Mar 2016, 6:57 am
OCR’s investigation discovered that Feinstein’s security management process was limited in scope, incomplete, and insufficient to address potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI held by the entity. [read post]