Remove 2015 Remove Communications Remove Computer and Electronics Remove Training
article thumbnail

Do’s and Don’ts of Text Message Discovery

eDiscovery Daily

Emails were the primary concern since they held the bulk (if not all) of business communications. Corporate servers stored the data, regardless of how the email was sent or received (via mobile device or work computer). 1] In 2015, research showed that 80% of professionals conducted business communications through texts.

article thumbnail

HHS Announces HIPAA Settlement with UMass

Hunton Privacy

UMass did not have firewalls in place to guard against unauthorized access to ePHI transmitted over an electronic communications network. UMass did not conduct an accurate and thorough risk analysis until September 2015. Train staff who have access to ePHI on the revised policies and procedures. ”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Grimm also plans to train others to do similar research at its Sparta outpost. Our smartphones and laptop computers generally become obsolete and get replaced by more secure versions every 24 months.

IoT 133
article thumbnail

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. Training staff on Archie meant that IT was often asked “How should I classify….”

IT 60
article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 15 These changes were intended to “enable the court[s] to keep a tighter rein on the extent of discovery.”16.

Privacy 95
article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In 2015, shortly after the Jeep hack, the National Transportation and Safety Board (NTSB) released a study suggesting that someone could take wireless signals within an airplane and perhaps cause mischief. After the NTSB released its 2015 report about aircraft hacking, very little action came of it. Or a satellite in space?

article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

A sophisticated set of encryption and electronics is at work inside the vehicle. As more and more automotive manufacturers start incorporating computer technology into their expensive BMWs, Mercedes Ferraris and Porsches. Lacking any formal computer training. And for the most part, this is true. He told the Prague post.