Privacy and Security Together: A Risk-Based Approach to Incident Response Management

Threats to the privacy and security of sensitive data are unavoidable.

Read more

What Security Detects, Privacy Assesses: Making Breach Determination a Team Effort

Privacy and information security often live in their own silos, an impractical separation that puts both an organization and its customers at risk from a data breach. This risk occurs when a security incident—say, a malware attack that exposes customer information—is remediated without undergoing a proper risk assessment to determine if it is a reportable breach.

Read more

Privacy and the Internet of Things: Everything Around You is Collecting Your Private Data

The Internet of Things, as its name suggests, is a big category.

Read more

It Takes A Village: Building Your Incident Response Team

Last week I attended the Technology Association of Oregon Cybersecurity Series event, “Breach, Incident or Spill,” an interactive presentation featuring RADAR CEO Mahmood Sher-Jan. Among other best practices, Mahmood outlined how assembling an incident response team now – before an incident has occurred –  is a crucial step to your internal process.

Read more

Remaining Compliant with OCR's Ransomware Guidance

Ransomware. This term has gained notoriety beyond compliance and privacy officers, becoming a household word thanks to the proliferation of news stories surrounding ransomware attacks in the media.

Read more

Trends in Data Breach Notification Law: Attorney General Requirements

In our final installment of data breach notification law trends, we’ll look at one of the fastest growing trends to date: notification of state attorneys general.

Read more

The REAL Cost of Failing the OCR Audits

It took a while, but phase 2 of the the HIPAA Audit Program, conducted by the Health and Human Services’ Office for Civil Rights (OCR), is here. Healthcare related organizations from the smallest business associate to the largest covered entity are eligible for this phase of audits—no one is immune.

Read more

Trends in Data Breach Notification Law: Content, Format, Font Size, and More

Today we continue our weekly blog series focused on 2016 trends in data breach notification law. Click below to catch up on previous installments:

Read more

Decisions, Decisions...The Incident Response Process Illustrated

Responding to privacy and security events naturally brings up a whole host of questions. What happened? What technology, people or data elements were involved? Was regulated data exposed? How? What has been done to mitigate the security risk? What must be done to remain compliant with privacy laws?

Read more

Trends in Data Breach Notification Law: Timely Notifications

Today we’re continuing our series of data breach notification law trends. If you missed the first part of the series, check out our discussion of the biggest trend in 2016, as well as our post focused on the expanding scope of personal information.

Read more

Everyday Events, Inevitable Incidents, and Data Breach Disasters

The Four Categories of Data Occurrences

In today’s threat-filled world, sensitive customer information is constantly at risk for exposure. Cyber attacks, ransomware, spear phishing, malware, system & process failure, employee negligence, lost or stolen devicesthe list of dangers goes on.

Read more

Trends in Data Breach Notification Law: Getting Personal (Information)

At any given time, the RADAR regulatory team is busy monitoring, tracking, and preparing for proposed and pending changes to data breach notification law.

As a RADAR product manager specializing in regulatory content, I have a front row view of the work that goes into ensuring RADAR is kept up-to-date with the latest advances in data breach notification law. As part of that work, the regulatory team has identified a number of trends that we expect to continue through 2016. Last week we covered an overarching trend towards increased stringency and specificity.

This week, we will dive a bit deeper into one aspect of this increased stringency as it relates to personal information and incident assessment.

Read more