Remove 2009 Remove Computer and Electronics Remove Risk
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud. As is true with any cloud service, the Seattle cloud computing company emphasizes the shared responsibility model. Alibaba Cloud. Amazon Web Services (AWS).

Security 120
article thumbnail

HHS Settles First HIPAA Enforcement Action Against a State Agency

Hunton Privacy

The settlement relates to the theft of a portable electronic storage device potentially containing electronic protected health information (“ePHI”) from the car of a DHSS computer technician in October 2009. View the HHS resolution agreement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Massachusetts Revises Information Security Regulations and Extends Deadline for Compliance

Hunton Privacy

On August 17, 2009, Massachusetts announced revisions to its information security regulations and extended the deadline for compliance with those regulations. ” First and foremost, the revisions emphasize a more flexible, risk-based approach to developing an information security program.

article thumbnail

This is the old ChiefTech blog.: Currently in Singapore

ChiefTech

©2005-2009. One highlight of the day was to briefly meet Dave Snowden in person, who is here in Singapore for the International Risk Assessment & Horizon Scanning Symposium. Well see "electronically" again. This is the old ChiefTech blog. Nice of you to drop in and visit. Please seek advice for specific circumstances.

article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Two

eDiscovery Daily

Throughout the case, the plaintiff claimed that the evidence needed to prove the case existed in emails stored on UBS’ own computer systems. That case and the subsequent rule changes effectively forced civil litigants into a compliance mode with respect to their proper retention and management of electronically stored information (ESI).

article thumbnail

Ten Years After: RIM Standards Evolve Slowly

Positively RIM

Leading-edge records managers joined the techies, smiling that their fledgling stock of electronic records were largely intact; disaster recovery tactics went unused. It is possible that the current buzz words -- Cloud Computing, Web 2.0, Records managers rarely say, “Gee whiz!” to mercurial novelty. (It

article thumbnail

European Data Privacy Day Expert Panel Provides 30-Year Retrospective on UK Data Protection

Hunton Privacy

The system required controllers to complete lengthy questionnaires, reflecting the fact that, at that time, data processing took place on a handful of large mainframe computers. The Emergence of the “Surveillance Society” – 2002 to 2009. He also developed the ICO’s approach to enforcement, taking a strategic, risk-based approach.