Search for: "Technical Security Integration, Inc." Results 141 - 160 of 311
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
26 Apr 2017, 6:14 pm by Cynthia Marcotte Stamer
Assess whether its existing security measures are sufficient to protect its ePHI and revise its Risk Management Plan, Policies and Procedures, and training materials and implement additional security measures, as needed. [read post]
10 Apr 2017, 12:22 pm by Dave Aitel
In this piece, I first critique elements of their proposal, and then recommend a different direction for setting cyber policy efforts—one rooted in a technical background—along with a new proposal for limiting our systemic risk in the financial arena based on existing practice among technical practitioners of offensive information security. [read post]
6 Apr 2017, 4:00 am by Administrator
Michael Maschke, CEO of Sensei Enterprises, Inc. [read post]
27 Mar 2017, 9:33 am by Jordan Brunner
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
20 Mar 2017, 11:03 am by Jordan Brunner
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
1 Mar 2017, 4:00 am by John Gregory
No reason of public policy or legal integrity required that result. [read post]
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
  The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on… [read post]
29 Sep 2016, 9:56 am by Riana Pfefferkorn
About the Crypto Policy Project Encryption helps human rights workers, activists, journalists, financial institutions, innovative businesses, and governments protect the confidentiality, integrity, and economic value of their activities. [read post]
24 Jun 2016, 10:18 am by John Elwood
Resource Investments, Inc. v. [read post]
17 May 2016, 10:42 am by John Chierichella
This rule is applied with equal force by the Court of Federal Claims, L-3 Communications Integrated Systems, L.P. v. [read post]
17 Apr 2016, 8:27 am by Barry Sookman
I recently had the privilege of speaking about the Trans-Pacific Partnership (TPP) at the Fordham 24th Annual Intellectual Property Law and Policy Conference, a stellar international IP conference. [read post]
 BLE’s key features also include an industry-standard wireless protocol that facilitates multi-vendor interoperability including connectivity with the large volume of Bluetooth devices on the market; adaptive frequency hopping; fast connections; a standardized application development architecture that leads to low development and operational costs; and enhanced security with 128-bit AES data encryption. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
”   On March 3, meanwhile, the FBI’s cyber division issued a Private Industry Notification, warning law firms that “in a recent cyber criminal forum post, a criminal actor posted an advertisement to hire a technically proficient hacker for the purposes of gaining sustained access to the networks of multiple international law firms,” Bloomberg reports. [read post]
22 Mar 2016, 6:57 am by Cynthia Marcotte Stamer
OCR’s investigation discovered that Feinstein’s security management process was limited in scope, incomplete, and insufficient to address potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI held by the entity. [read post]
22 Mar 2016, 6:57 am by Cynthia Marcotte Stamer
OCR’s investigation discovered that Feinstein’s security management process was limited in scope, incomplete, and insufficient to address potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI held by the entity. [read post]