Search for: "Compliance Software, Inc., doing business as Compliance Information Systems" Results 41 - 60 of 233
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
8 Dec 2010, 4:57 am by Rob Robinson
http://tinyurl.com/2ddbeca (JD Lasica) Do You Know Where Your Documents Are? [read post]
6 Jun 2022, 7:06 am by James Mulvenon
The U.S. export control system is complex and involves several departments, laws and regulations. [read post]
21 Aug 2018, 7:26 am by Carlos Leyva
Training for information technology personnel that are required to audit information systems containing PHI. [read post]
21 Aug 2018, 7:26 am by Carlos Leyva
Training for information technology personnel that are required to audit information systems containing PHI. [read post]
21 Jan 2010, 12:18 pm by Rebecca Tushnet
” According to the complaint: Plaintiff makes TrustedAgent, software that automates compliance with FISMA. [read post]
25 Aug 2022, 10:45 am by Hunton Andrews Kurth LLP
It also indicates that the OAG is serious about enforcing businessescompliance with the Global Privacy Control. [read post]
1 May 2012, 11:32 am by McNabb Associates, P.C.
In 2002, Neopoint Inc. paid a $95,000 civil penalty to settle charges that it unlawfully exported 128-bit encryption software to South Korea. [read post]
22 Mar 2016, 6:57 am by Cynthia Marcotte Stamer
Feinstein Settlement Feinstein is a biomedical research institute that is organized as a New York not-for-profit corporation and is sponsored by Northwell Health, Inc., formerly known as North Shore Long Island Jewish Health System, a large health system headquartered in Manhasset, New York that is comprised of twenty one hospitals and over 450 patient facilities and physician practices. [read post]
22 Mar 2011, 12:16 pm by Robert Elliott, J.D.
"Companies that do business with our government have a responsibility to ensure that their workplaces are safe, fair and diverse. [read post]
25 Aug 2022, 1:48 pm by Hunton Andrews Kurth LLP
It also indicates that the OAG is serious about enforcing businessescompliance with the Global Privacy Control. [read post]
17 Mar 2024, 5:42 pm by Cynthia Marcotte Stamer
  Under the HIPAA Security Rule, covered entities must conduct documented risk assessments to evaluate and monitor their electronic personal health information (EPHI) and associated systems for potential breaches and other threats that expose EPHA to unauthorized use, access, disclosure, destruction or other compromise. [read post]
15 Dec 2022, 8:00 am by CFM Admin
We have also developed a checklist to help managers effectively oversee the business and regulatory landscape for the coming year. [read post]
15 Dec 2022, 4:00 am by CFM Admin
We have also developed a checklist to help managers effectively oversee the business and regulatory landscape for the coming year. [read post]
16 Dec 2019, 3:13 pm by Cynthia Marcotte Stamer
§ 164.312(b) requires a covered entity to implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI. [read post]
  He cautioned that organisations that do not regularly monitor for suspicious activity and fail to act on warnings, or do not update software and provide staff training, can expect a fine. [read post]
5 Dec 2017, 12:01 pm by ligitsec
Edward Bruce, Covington & Burling, Washington, D.C., for amicus Business Software Alliance. [read post]
30 Oct 2009, 2:01 am
  Old systems were not designed for the way that business is now done - data warehouses now allow managers to bring all information into a central repository and helps the manager to have a holistic view of their portfolios. [read post]
8 Dec 2021, 7:27 am by CFM Admin
Such managers should consult with legal counsel to determine whether they are required to register in the states in which they conduct business. [read post]