Guide: Information Sharing in Criminal Justice-Mental Health Collaborations: Working with HIPAA and Other Privacy Laws (pdf) Authors: John Petrila, J.D., L.L.M. Department of Mental Health Law & Policy College of Behavioral and Community Sciences University of South Florida Hallie Fader-Towe, J.D. Council of State Governments Justice Center Hallie Fader-Towe, J.D. Council of State Governments Justice…
Protecting your genetic privacy
Sean Brooks of CDT writes: … Recently, the Council for Responsible Genetics published a “Genetic Privacy Manual.” The online guide is a comprehensive source of information for consumers about the use of genetic information in fields ranging from human health and reproduction to the criminal justice system. The guide delves into the science of genetic testing…
Court: Computer Fraud and Abuse Act violated even if no financial motive or gain
Back in August 2009, I noted the conviction of a former SSA employee, Roberto Rodriguez. At the time, I reported: Roberto Rodriguez, 54, formerly of Fort Lauderdale, FL, was convicted by a jury on July 29, 2009 of seventeen counts of exceeding his authorized access to a government computer. Rodriguez is scheduled to be sentenced…
KCI notifies some patients that employee misused their payment cards
On December 21, KCI (Kinetic Concepts, Inc.) Health Care Compliance notified the New Hampshire Attorney General’s Office of a security breach involving fraud. An employee in their Texas call center with authorized access to a database containing customers’ payment card data had reportedly misused the information of “several” customers to make purchases in the San Antonio area….
KCI notifies some patients that employee misused their payment cards
On December 21, KCI (Kinetic Concepts, Inc.) Health Care Compliance notified the New Hampshire Attorney General’s Office of a security breach involving fraud. An employee in their Texas call center with authorized access to a database containing customers’ payment card data had reportedly misused the information of “several” customers to make purchases in the San…
As 2010 draws to a close, data breach version
A breach involving paper records just became my last breach post for 2010. It seems somehow appropriate, as breaches involving paper records constitute over 20% of breaches I find out about but they’re often not taken as seriously, it seems, as breaches involving large electronic databases. Yet these types of breaches, which often go unreported,…