Search for: "In Matter of Copy-data Systems, Inc" Results 261 - 280 of 659
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
27 Mar 2019, 8:13 am by Cynthia Marcotte Stamer
Past Chair of the ABA Managed Care & Insurance Interest Group and, a Fellow in the American College of Employee Benefit Counsel, the American Bar Foundation and the Texas Bar Foundation, heavily involved in health benefit, health care, health, financial and other information technology, data and related process and systems development, policy and operations throughout her career, and scribe of the ABA JCEB annual Office of Civil Rights agency meeting, Ms. [read post]
10 Dec 2019, 4:02 pm by Cynthia Marcotte Stamer
The 2018 National Health Expenditures data and supporting information will appear here. [read post]
17 Aug 2011, 9:27 am by Jonathan Bailey
Related cases on the issue of data scraping, sometimes called data mining, have largely been equally negative for the scrapers. [read post]
8 Aug 2012, 7:21 am by Cynthia Marcotte Stamer
  Persons not registered at least 48 hours in advance will only participate subject to system and space availability. [read post]
14 May 2015, 12:57 am by INFORRM
Provided these criteria are satisfied (not a straightforward matter for data controllers based outside Europe), data protection actually becomes relatively simple compared to Article 8 privacy and defamation laws. [read post]
4 Jan 2011, 3:16 pm by Gene Quinn
Uniloc’s ’216 patent is directed to a software registration system to deter copying of software. [read post]
16 Oct 2018, 3:55 pm by Cynthia Marcotte Stamer
On March 13, 2015, Anthem filed a breach report with the HHS Office for Civil Rights  that disclosed that Anthem discovered on January 29, 2015 that cyber-attackers had gained access to and engaged in continuous and targeted cyberattack on Anthem’s IT system for the apparent purpose of extracting data, otherwise known as an advanced persistent threat attack. [read post]
1 Jun 2009, 9:00 pm
The data belonged to card transactions that CardSystems had retained on its system and stored in unencrypted format, both violations of CISP standards. [read post]
18 Sep 2019, 9:52 pm by Kevin LaCroix
 “Malware” is oft defined as software designed to interfere with a computer’s normal functioning, such as viruses (which can wreak havoc on a system by deleting files or directory information); spyware (which can secretly gather data from a user’s system); worms (which can replicate themselves and spread to other computers); or Trojan horses (which upon execution, can cause loss or theft of data and system harm). [read post]
2 Apr 2012, 4:00 am by Devlin Hartline
The internet, after all, is just a global network of interconnected intermediaries who host, transport, and organize our data. [read post]
1 Oct 2021, 9:19 am by Cynthia Marcotte Stamer
Khan identified “the commodification of sensitive health information, where companies can use this data to feed behavioral ads or power user analytics” as an even “more fundamental problem. [read post]
8 Jan 2019, 12:38 pm by Cynthia Marcotte Stamer
For example: Despite the individual right to access health information about themselves established by the HIPAA Privacy Rule, patients often lack access to their own health information, which hinders their ability to manage their health and shop for medical care at lower prices; Health care providers often lack access to patient data at the point of care, particularly when multiple health care providers maintain different pieces of data, own different systems, or use… [read post]
13 Dec 2018, 12:15 pm by Cynthia Marcotte Stamer
Stamer has worked closely with these and other clients on the design, development, administration, defense, and breach and data recovery of health care, workforce, insurance and financial services, trade secret and other information technology, data and related process and systems development, policy and operations throughout her career. [read post]
23 Nov 2010, 9:40 am
Business Reality - http://tinyurl.com/26gbozg (Chad Bockius) De-Duping Reductions as a Percentage of Number of Original Document in Culled Data Collections - http://tinyurl.com/23nrx8u (Anne Kershaw and Joe Howie) Gartner Inc. [read post]