Search for: "Telephone and Data Systems, Inc." Results 261 - 280 of 501
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
26 Dec 2016, 4:30 am by Ben
Well Marie-Andree cited that 1879 case  Feist Publications, Inc. v. [read post]
9 Dec 2016, 6:14 am
 See Tor Metrics, The Tor Project, Inc., https://metrics.torproject.org/networksize.html. [read post]
17 Nov 2016, 4:18 am by INFORRM
Threat modeling – anticipating what adversaries might do with AR – is essential to avoid compromised systems causing harm to individuals. [read post]
4 Nov 2016, 6:33 am
McKellips, supra.McKellips appealed to the Wisconsin Court of Appeals, which held that the jury instruction on § 948.075 `misdirected’ the jury by asking it to determine whether the cellphone itself constituted the computerized communication system instead of asking the jury `whether McKellips' various alleged uses of the cell phone constituted communication via a computerized communication system. [read post]
1 Nov 2016, 5:27 pm by INFORRM
As far as privacy breaches go, this appears less sinister than having the contents of your private telephone conversations splashed across the front pages. [read post]
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
  The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on all… [read post]
2 Oct 2016, 12:11 pm by Dennis Crouch
See ‘610 patent, col. 1 ll. 59–61 (describing “screen[ing] computer data for viruses within a telephone network before communicating the computer data to an end user”). [read post]
28 Sep 2016, 4:00 am by Martin Kratz
They also set up a dedicated telephone line and an email inquiry system to allow affected user to communicate with ALM about the breach. [read post]
28 Jul 2016, 2:30 pm by Cynthia Marcotte Stamer
The Resolution Agreement makes clear that these additional responsibilities include, but are not necessarily limited to ensuring that proper safeguards are implemented and enforced to secure access not only to the ePHI contained on the laptop as well as other data bases and systems containing ePHI accessible through the laptop. [read post]
15 Jun 2016, 8:08 am by Kevin LaCroix
  In Citizen VC and the Companion C&DIs the staff provided helpful guidance in several important areas: First, the staff confirmed the continuing vitality of certain key positions previously announced in the Legacy Interpretative Advice; Second, the staff collected and re-introduced the most important of the principles from the Legacy Interpretative Advice in a single letter (along with the Companion C&DIs); Third, the staff updated its views in the Legacy Interpretative Advice… [read post]
8 Jun 2016, 7:14 am
Khan provided CNHS with personally identifiable information such as her date of birth, Social Security number, address, and telephone number. [read post]
26 May 2016, 12:05 pm by Cynthia Marcotte Stamer
Many physicians or other health care providers that use electronic health records (EHRs) certified to allow individuals to access their PHI in the system may be unaware that OCR views the availability of electronic access from the EHR affects the health care provider’s ability to charge for copies of requested PHI. [read post]
24 May 2016, 11:03 am by Harris Hoffberg
The TCPA, and the FCC’s regulations under the TCPA, prohibit the use of an “automatic telephone dialing system” to call certain telephone numbers without the prior express consent, or in the case of sales calls, prior express written consent, of the recipient. [read post]