Hannah Clay Wareham reports: The debacle beginning in March 2009 with the loss of confidential patient records on a Red Line train continues in the new year with allegations of harassment against Massachusetts General Hospital staff. […] Soon after Jacob received the administrative assistant’s e-mail, Jacob says an anonymous caller alerted him to the appearance…
ISP operators among 19 arrested in cyber-fraud case
Robert McMillan reports on the indictment recently reported here that involved raids on some Dallas businesses back in April. You can read his coverage on Computerworld.
UK: Data breaches to incur up to £500,000 penalty
New powers, designed to deter personal data security breaches, are expected to come into force on 6 April 2010. The Information Commissioner’s Office (ICO) will be able to order organizations to pay up to £500,000 as a penalty for serious breaches of the Data Protection Act. The ICO has produced statutory guidance about how it…
UK: Action taken after personal details found in waste bins
The Information Commissioner’s Office (ICO) has found Bellgrange Mortgages and Insurance Services Ltd in breach of the Data Protection Act after clients’ details were found in two large waste bins intended for the use of local residents. The organization, based in Stanmore, has signed an official Undertaking to improve data security. The material included mortgage…
On Managing Your Own Health Records
By Doug Pollack, Chief Marketing Officer for ID Experts One of the panels at the Consumer Electronics Show Digital Health Summit is asking a really interesting question: Who will you trust with your health data? As described in an article in Healthcare IT News on healthcare data privacy and security, there have been numerous data…
Recovery firms may steal your data
Judi Hasson reports: […] A new survey finds that data-recovery services are responsible for a growing chunk of privacy breach incidents. It’s not really a surprise. An outside vendor contracted to repair your computer may not have the security mechanisms in place to prevent a theft. Or the company may have IT workers willing to…