Search for: "Applied Integrated Technologies, Inc." Results 401 - 420 of 819
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
  The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on… [read post]
19 Oct 2016, 4:00 am by Guest Blogger
Maple Trust Company, 2007 ONCA 74 (CanLII). [3] CIBC Mortgages Inc. v. [read post]
29 Sep 2016, 9:56 am by Riana Pfefferkorn
CIS studies the interaction of new technologies and the law and strives to improve both technology and law, encouraging decision makers to design both as a means to further democratic values. [read post]
13 Sep 2016, 12:17 pm by Michael Grossman
Then it’s the law, per the way our country creates and applies it. [read post]
10 Aug 2016, 6:00 pm by The Public Employment Law Press
New legal search tool available from CasetextSource: Casetext, Inc., 430 Sherman Ave., Suite 305, Palo Alto, CA 94306Using the latest computer technology, Casetext has a new tool for use in legal research, its Case Analysis Research Assistant [CARA]. [read post]
28 Jul 2016, 2:30 pm by Cynthia Marcotte Stamer
§164.308(a)(1)(i) by failing to implement policies and procedures to prevent, detect, contain, and correct security violations, including conducting an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of all of the ePHI it holds, and implementing security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level; From January 19, 2013, until March 1, 2014, UMMC violated 45… [read post]
24 Jun 2016, 10:18 am by John Elwood
Resource Investments, Inc. v. [read post]
16 Jun 2016, 2:48 pm by Kevin LaCroix
  In a separate order, Marsh agreed to an industry and penny stock bar with the right to apply for reentry after five years. [read post]
6 May 2016, 12:30 pm
Wright Medical Technology, Inc., 16 F. [read post]
3 May 2016, 2:11 pm by Rebecca Tushnet
 David Kaplan, Warner Brothers Entertainment Inc.: Use tech fingerprinting and scanning in enforcement. [read post]
28 Apr 2016, 11:29 am by David Fraser
The Calgary Herald argued that sections 4(3)(c) and 4(3)(k) of PIPA meant that PIPA would not apply to these activities. [read post]
21 Apr 2016, 10:07 am by Cynthia Marcotte Stamer
OCR Charges Brought For Business Associate Agreement Violations HIPAA’s Privacy Rules generally apply to “covered entities,” which under HIPAA are health plans and insurers, health care providers, health care clearinghouses (Covered Entities) and “business associates,” which are individuals or entities that perform services that aid the  Covered Entity to perform its duties as a Covered Entity. [read post]
21 Apr 2016, 10:07 am by Cynthia Marcotte Stamer
OCR Charges Brought For Business Associate Agreement Violations HIPAA’s Privacy Rules generally apply to “covered entities,” which under HIPAA are health plans and insurers, health care providers, health care clearinghouses (Covered Entities) and “business associates,” which are individuals or entities that perform services that aid the  Covered Entity to perform its duties as a Covered Entity. [read post]
17 Apr 2016, 8:27 am by Barry Sookman
The exemption in s.41.2 which applies to a library, archive, or museum is limited to not-for-profit entities, as the definition in the Act makes clear.[3] No amendment would be required. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
  Last year, the American Bar Association reported in its annual Legal Technology Survey that one in four firms with at least 100 attorneys have experienced data breaches involving hackers, website attacks or stolen or lost smartphones, tablets or laptop computers. [read post]