Planet Mars, Curiosity, and Data Security
For those captivated by recent events in astronomy, parallels can be drawn between the recent landing of NASA’s rover Curiosity on planet Mars and the public discourse on data security in Canada. With...
View ArticleIt’s Time for Professionals to Practice What They Preach
The following column appeared in the September 2012 issue of the Advisen Cyber Journal. I hope it resonates with our legal eagle subscribers. If not, then your brokers (and I) have more work to do....
View ArticleHIPAA Enforcement – The Gathering Storm Has Arrived
Since the Health Insurance Portability and Accountability Act (“HIPAA”) privacy rules became effective in April 2003, there has been minimal enforcement activity by the U.S. Department of Health and...
View ArticleThe Queen v. Cole: Privacy Protection for Employer-Issued Equipment in Canada
The recent decision The Queen v. Cole by the Supreme Court of Canada touches upon interesting issues regarding information privacy in the digital age. The facts are simple. An information technologist...
View ArticleWho Owns Patient Data in Electronic Health Records?
Following is a guest post by Doug Pollack, CIPP/US, chief strategy officer at ID Experts, a leading provider of healthcare privacy and data breach solutions. The article explores the thorny issue of...
View ArticleIdentity Theft: A Christmas Poem Revisited
Regular Cyberinquirer readers may recall the following holiday poem by Amanda Lorenz. Like the Yule Log, we here at Cyberinquirer Central have decided to republish Amanda’s poem on an annual basis at...
View ArticleHHS Announces Settlement with Idaho Hospice for Data Breach Involving Fewer...
On January 2, 2013 The Department of Health and Human Services (“HHS”) announced that it had entered into a Resolution Agreement with Hospice of North Idaho (“HONI”) to settle alleged HIPAA violations...
View ArticlePower to the People: Social Media Technologies Mediating Corporate Social...
The measure of effectiveness of a CEO and its executive board has always been the degree to which the business is achieving its purpose. Whether in Canada, the U.S., Europe or Asia, an executive...
View ArticleCyber Liability Insurance: Ensuring Adequate Coverage in the Age of E-Commerce
I. Introduction: Insurance Products for Cyber Risks Increasing reports of cyber intrusions, data theft and computer system malfunctions have led a rapidly-growing number of companies to purchase...
View ArticleThe Posts have Come Back… To Cyberinquirer
Since last we visited, your humble Publisher has moved on to the Law Offices of Richard J. Bortnick, where I am Managing Director (very European, if I do say so myself). A number of dedicated readers...
View ArticleThe Insurance Industry: In Regulators’ Sights
If you’re an insurance company, it may be time to open your cyber-related checkbooks if you haven’t done so already. New York Governor Andrew Cuomo’s Department of Financial Services (“NYSDF”) soon may...
View ArticleCanadians More Exposed Than One Would Think
Okay. Let’s start with the obvious. No, this has nothing to do with Canadian citizens and immigrants behaving badly, although that may be a topic for a future post. What we’re talking about is the...
View ArticleProtecting Our Children from Internet Predators, Marketers and Information...
As everyone knows, the Internet has dramatically altered (read: simplified) the way we communicate, do business and satisfy our intellectual and social curiosities. Indeed, Internet-based sales topped...
View ArticleCyber Liability Insurance: The Value of an Educated Broker in the Age of...
Introduction: Insurance Products for Cyber Risks Media reports of cyber intrusions, data thefts and computer system malfunctions involving large, high-profile companies such as Sony PlayStation,...
View ArticleAsia-Pacific Cyber Law Risks and Developments
We first published the following White Paper extract in October 2011. While the White Paper might be somewhat dated (and therefore will be refreshed shortly), it remains relevant for our friends...
View ArticleHuman Error: The Greatest Risk and Root Cause of Data Security
Whether discussing data encryption, network security, or internal data privacy management practices and policies, the most sophisticated IT security protocols, the most learned team of specialists, and...
View ArticleState Privacy Laws Evolve While Congress Campaigns
New legislation governing data breaches and privacy issues is popping up in states across the country. Most recently, Connecticut, Vermont, and Illinois have enacted new laws in these areas....
View ArticleCanada Update: The Tort of “Intrusion upon Seclusion”
The following was written by my friend Patrick Cruikshank, Underwriting Manager, Specialty Risk – Professional Liability at Northbridge Insurance in Toronto. Thanks to Patrick for his contribution....
View ArticleCyber, Privacy and Technology Best Practices and Reputational Harm: Why Legal...
Introduction Lawyers, like other professionals, often have access to their clients’ personal and financial details. At the same time, they may possess comparable information about their clients’...
View ArticleCyber Security and Data Breaches: Why Directors and Officers Should Be Concerned
Following is an excerpt from the leading chapter in Willis London’s Executive Risks: A Boardroom Guide 2012/2013. If you would like to read the entire chapter, please contact me at rbortnick@cpmy.com....
View Article
More Pages to Explore .....