David Migoya reports on how Colorado received a grant to have an ID theft victims’ advocate within law enforcement itself so that people can be referred to someone who can assist them. Read more about it The Denver Post
House bill asks states to link drug databases
Kathryn Foxhall reports: Legislation now before the House would renew federal grant funding for state prescription drug monitoring networks, but would demand more interoperability among the systems. Thirty-three states have Prescription Drug Monitoring Programs (PDMPs), which are statewide databases for tracking records of dispensed controlled substances. Another 10 have provisions authorizing such systems. Read more…
Mayo Clinic worker fired for snooping on patient records
Jeff Hansel reports that the Mayo Clinic has fired an employee for snooping into medical and financial records over a period of four years: The employee worked in the Mayo financial business unit in Arizona and once worked in Rochester. An estimated 1,700 patient records were accessed, said Mayo spokesman Chris Gade, noting the employee…
Do Egyptian mummies have a right to privacy?
Okay, I’ve occasionally blogged about the right to privacy for the deceased, so this article by Jo Marchant in New Scientist really caught my eye. Here’s how it begins: Should we consider the privacy or reputation of the individual when analysing an Egyptian mummy? The assumption that ancient corpses are fair game for science is…
Lucile Packard Children's Hospital Appeals CDPH Fine (updated)
For Release: September 09, 2010 PALO ALTO, Calif. — Lucile Packard Children’s Hospital at Stanford is appealing a California Department of Public Health (CDPH) penalty. The CDPH on April 23, 2010, after the self-reporting of a security incident by Packard Children’s, alerted the hospital that a fine of $250,000 was being levied as a result…
Great resource: Cloutage.org
The good folks at Open Security Foundation have created a database of cloud computing incidents. The incidents are tagged as “AutoFail,” “DataLoss,” “Hack,” “Outage,” or “Vulnerability,” permitting researchers and professionals to analyze different types of incidents. As of this morning, there are 222 incidents in the database as they have backfilled some earlier incidents…