Quantcast
Channel: http://www.cyberinquirer.com/
Browsing all 63 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Planet Mars, Curiosity, and Data Security

For those captivated by recent events in astronomy, parallels can be drawn between the recent landing of NASA’s rover Curiosity on planet Mars and the public discourse on data security in Canada. With...

View Article



Image may be NSFW.
Clik here to view.

It’s Time for Professionals to Practice What They Preach

The following column appeared in the September 2012 issue of the Advisen Cyber Journal. I hope it resonates with our legal eagle subscribers. If not, then your brokers (and I) have more work to do....

View Article

Image may be NSFW.
Clik here to view.

HIPAA Enforcement – The Gathering Storm Has Arrived

Since the Health Insurance Portability and Accountability Act (“HIPAA”) privacy rules became effective in April 2003, there has been minimal enforcement activity by the U.S. Department of Health and...

View Article

Image may be NSFW.
Clik here to view.

The Queen v. Cole: Privacy Protection for Employer-Issued Equipment in Canada

The recent decision The Queen v. Cole by the Supreme Court of Canada touches upon interesting issues regarding information privacy in the digital age. The facts are simple. An information technologist...

View Article

Image may be NSFW.
Clik here to view.

Who Owns Patient Data in Electronic Health Records?

Following is a guest post by Doug Pollack, CIPP/US, chief strategy officer at ID Experts, a leading provider of healthcare privacy and data breach solutions. The article explores the thorny issue of...

View Article


Image may be NSFW.
Clik here to view.

Identity Theft: A Christmas Poem Revisited

Regular Cyberinquirer readers may recall the following holiday poem by Amanda Lorenz. Like the Yule Log, we here at Cyberinquirer Central have decided to republish Amanda’s poem on an annual basis at...

View Article

Image may be NSFW.
Clik here to view.

HHS Announces Settlement with Idaho Hospice for Data Breach Involving Fewer...

On January 2, 2013 The Department of Health and Human Services (“HHS”) announced that it had entered into a Resolution Agreement with Hospice of North Idaho (“HONI”) to settle alleged HIPAA violations...

View Article

Image may be NSFW.
Clik here to view.

Power to the People: Social Media Technologies Mediating Corporate Social...

The measure of effectiveness of a CEO and its executive board has always been the degree to which the business is achieving its purpose. Whether in Canada, the U.S., Europe or Asia, an executive...

View Article


Image may be NSFW.
Clik here to view.

Cyber Liability Insurance: Ensuring Adequate Coverage in the Age of E-Commerce

I. Introduction: Insurance Products for Cyber Risks Increasing reports of cyber intrusions, data theft and computer system malfunctions have led a rapidly-growing number of companies to purchase...

View Article


Image may be NSFW.
Clik here to view.

The Posts have Come Back… To Cyberinquirer

Since last we visited, your humble Publisher has moved on to the Law Offices of Richard J. Bortnick, where I am Managing Director (very European, if I do say so myself). A number of dedicated readers...

View Article

Image may be NSFW.
Clik here to view.

The Insurance Industry: In Regulators’ Sights

If you’re an insurance company, it may be time to open your cyber-related checkbooks if you haven’t done so already. New York Governor Andrew Cuomo’s Department of Financial Services (“NYSDF”) soon may...

View Article

Image may be NSFW.
Clik here to view.

Canadians More Exposed Than One Would Think

Okay. Let’s start with the obvious. No, this has nothing to do with Canadian citizens and immigrants behaving badly, although that may be a topic for a future post. What we’re talking about is the...

View Article

Image may be NSFW.
Clik here to view.

Protecting Our Children from Internet Predators, Marketers and Information...

As everyone knows, the Internet has dramatically altered (read: simplified) the way we communicate, do business and satisfy our intellectual and social curiosities. Indeed, Internet-based sales topped...

View Article


Image may be NSFW.
Clik here to view.

Cyber Liability Insurance: The Value of an Educated Broker in the Age of...

Introduction: Insurance Products for Cyber Risks Media reports of cyber intrusions, data thefts and computer system malfunctions involving large, high-profile companies such as Sony PlayStation,...

View Article

Image may be NSFW.
Clik here to view.

Asia-Pacific Cyber Law Risks and Developments

We first published the following White Paper extract in October 2011. While the White Paper might be somewhat dated (and therefore will be refreshed shortly), it remains relevant for our friends...

View Article


Image may be NSFW.
Clik here to view.

Human Error: The Greatest Risk and Root Cause of Data Security

Whether discussing data encryption, network security, or internal data privacy management practices and policies, the most sophisticated IT security protocols, the most learned team of specialists, and...

View Article

Image may be NSFW.
Clik here to view.

State Privacy Laws Evolve While Congress Campaigns

New legislation governing data breaches and privacy issues is popping up in states across the country. Most recently, Connecticut, Vermont, and Illinois have enacted new laws in these areas....

View Article


Image may be NSFW.
Clik here to view.

Canada Update: The Tort of “Intrusion upon Seclusion”

The following was written by my friend Patrick Cruikshank, Underwriting Manager, Specialty Risk – Professional Liability at Northbridge Insurance in Toronto. Thanks to Patrick for his contribution....

View Article

Image may be NSFW.
Clik here to view.

Cyber, Privacy and Technology Best Practices and Reputational Harm: Why Legal...

Introduction Lawyers, like other professionals, often have access to their clients’ personal and financial details. At the same time, they may possess comparable information about their clients’...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security and Data Breaches: Why Directors and Officers Should Be Concerned

Following is an excerpt from the leading chapter in Willis London’s Executive Risks: A Boardroom Guide 2012/2013. If you would like to read the entire chapter, please contact me at rbortnick@cpmy.com....

View Article
Browsing all 63 articles
Browse latest View live




Latest Images