Search for: "Integrated Network Solutions, Inc." Results 141 - 160 of 386
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
6 Feb 2017, 4:57 am
 CFJN will promote community inspired solutions and public policies that advance the health and well-being of all communities. [read post]
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
  The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on… [read post]
28 Jul 2016, 2:30 pm by Cynthia Marcotte Stamer
  Based on this investigation, OCR concluded that while the laptop apparently was password protected, UMMC had breached the Security Rules because ePHI stored on a UMMC network drive was vulnerable to unauthorized access via UMMC’s wireless network because users could use a generic username and password to access an active directory containing 67,000 files including 328 files containing the ePHI of an estimated 10,000 patients. [read post]
16 Jun 2016, 2:48 pm by Kevin LaCroix
John Reed Stark As I noted in a recent post, on June 8, 2016, the SEC, in what one commentator called “the most significant SEC cybersecurity-related action to date,” announced that Morgan Stanley Smith Barney LLC had agreed to pay a $1 million penalty to settle charges that as a result of its alleged failure to adopt written policies and procedures reasonably designed to protect customer data, some customer information was hacked and offered for sale online. [read post]
9 May 2016, 2:19 pm by Alex R. McQuade
The Times reports that Afghan and American officials are seeing signs of a closer integration of the Haqqani Network and the leadership of the Taliban, a shift that is “changing the flow of the Afghan insurgency this year. [read post]
” The initiative hopes to circumvent the expenditure of time and resources in building consensus between multiple standards approaches, accelerating innovation and assisting developers create solutions that map to one open IoT interoperability specification. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
  Is this highly confidential and imperative electronic data hard to locate and identify on the devices and networks of law firms? [read post]
There will be an estimated 24 billion connected IoT devices by 2020, and nearly $6 trillion will be spent on IoT solutions over the next five years. [read post]
22 Mar 2016, 6:57 am by Cynthia Marcotte Stamer
To catch up on this latest guidance, Solutions Law Press, Inc. [read post]
22 Mar 2016, 6:57 am by Cynthia Marcotte Stamer
OCR’s investigation discovered that Feinstein’s security management process was limited in scope, incomplete, and insufficient to address potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI held by the entity. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
  Cyber-attacks involving the theft of intellectual property can result in a company’s immediate or even permanent loss of revenue and reputation; cyber-attacks involving denial of services (such as a website being shut down by nefarious hackers) can disrupt or forever diminish consumer or customer confidence; cyber-attacks involving exfiltration of private company emails can have a tumultuous impact upon senior management and create an international uproar; cyber-attacks involving… [read post]
16 Dec 2015, 9:26 am by Robert B. Milligan
The series consisted of nine webinars: 2014 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete and Computer Fraud Law Protecting Confidential Information and Client Relationships in the Financial Services Industry International Trade Secrets and Non-Compete Law Update Employee Social Networking: Protecting Your Trade Secrets in Social Media How and Why California is Different When It Comes to Trade Secrets and Non-Competes State… [read post]
9 Sep 2015, 2:21 pm by Cynthia Marcotte Stamer
Solutions Law Press, Inc. is happy to share information about this upcoming free health industry study group meeting on 9/15/2015 in Irving, Texas. [read post]
21 Aug 2015, 6:07 pm by Cynthia Marcotte Stamer
  While sponsoring businesses inevitably will need to involve or coordinate with their accounting, broker, and other vendors involved with the plans, businesses generally will want to get legal advice in a manner that preserves their potential to claim attorney-client privilege to protect against discovery in the event of future enforcement or litigation actions sensitive discussions and analysis about compliance audits, plan design choices, and other risk management and liability… [read post]
21 Aug 2015, 11:24 am by Cynthia Marcotte Stamer
Employers sponsoring health plans and members of their management named as plan fiduciaries or otherwise having input or oversight over the health plan should verify their company’s group health plan meets the out-of-pocket maximum rules of the Patient Protection and Affordable Care Act (ACA) § 1302(c)(1) as well as a long list of other federal health benefit rules to minimize the risk that violations will compel the sponsoring employer to self-assess, self-report on IRS Form 8928, and… [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
In cybersecurity, most companies allocate significant resources to fortifying their networks and to denying access to cyber-attackers. [read post]
28 May 2015, 4:00 am by Ken Chasse
Records systems are becoming a network of applications existing in-house, in mobile devices, and in centralized, shared utility services such as “the cloud. [read post]