Remove 2010 Remove 2017 Remove Insurance Remove IT
article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. NYDFS: Setting a new bar for state cybersecurity regulation.

article thumbnail

OCR Issues Penalty for Noncompliance with HIPAA Privacy and Security Rules

Hunton Privacy

On February 1, 2017, the U.S. This is the third enforcement action taken by OCR in 2017, following the respective actions taken against MAPFRE Life Insurance of Puerto Rico and Presence Health earlier in January. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced a $3.2

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

M&A Due Diligence: The Devil in Their Data

Data Matters

*Article first appeared in Corporate Board Member on November 7, 2017. Cybersecurity insurance was a relatively new—and far from prevalent—concept. Yet too many deals suffer from superficial consideration of these issues. To say that’s changed is an understatement. Cybersecurity Risk in the Boardroom.

article thumbnail

IRS Will Soon Require Selfies for Online Access

Krebs on Security

was originally launched in 2010 with the goal of helping e-commerce sites validate the identities of customers who might be eligible for discounts at various retail establishments, such as veterans, teachers, students, nurses and first responders. The IRS says it will require ID.me for all logins later this summer. McLean, Va.-based

Access 363
article thumbnail

FTC Seeks Comment on Proposed Changes to GLBA Implementing Rules

HL Chronicle of Data Protection

The Safeguards Rule, which originally went into effect in 2003, is process-oriented. It includes general, high level elements of a security program, but lacks detailed security steps. The proposed Rule would require FIs to implement an incident response plan. Chief Information Security Officer (“CISO”). Board reporting. Periodic risk assessments.

Privacy 40
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future. Here, Part 3 discusses how to manage the various DT risks. One essential step is developing the DT business case and connecting it with the critical success factors (CSFs) and the product scope.

article thumbnail

For nearly two decades, IBM Consulting has helped power SingHealth’s digital transformation

IBM Big Data Hub

HR digital transformation In 2010, SingHealth needed to consolidate the disparate HR systems across its hospitals, specialty centres and polyclinics. In 2017, the Ministry of Health launched yet another reorganisation of the public health system into three integrated regional clusters.