RiskIT Logo

Issue 32                                                     Thursday, July 15, 2011 

 

New Strategies for Securing Health Data

 

 

Regulations such as HIPAA and HITECH drive healthcare providers and payers to adopt information protection strategies. But adoption of consumer-facing electronic privacy is a mixed bag.

By attending this July 20th session, you will learn key consumer-patient trends as they relate to consumption of information, common techniques for securing information that needs to be sent to patients, how to dramatically save costs associated with business processes such as Explanation of Benefits, and more.

For more information, please click:

New Strategies for Securing Health Data 

5 Must-Have Skills for Fraud Examiners

 

  

 

Careers Open for Pros Who Can Track a Digital Trail 

 

It appeared to be a classic case of embesslement.

 

Jean-Francois Legault, a lead fraud examiner at Deliotte, was investigating a client case, and he know that an executive was hiding corporate funds. But he didn't know where the money was going.

 

In a traditional fraud investigation, there would have been a lot of interviewing and reviewing of documents. However, in this case, Legaut and his team simply seized the suspect's computer. 

 

 

 

To read this article in its entirety, please click:

 
 

 

 

 

 

 

Risk Management and Compliance - Part Two

 

   

We're all in it together...

Increasingly, I am being asked by my customers to help with their customers' awsareness of the threats that we are all trying to fight. In the UK, when cardholder information is compromised, consumers are well protected by the current legislation and regulations, and they are all aware of this.

However, when their identity gets stolen, it's a whole different personal matter.


To read this article in its entirety, please click:

Risk Management and Compliance Part Two

 

 

How to Inform Customers of a Data Breach

 

The news is bad: Your company suffered a data breach. Don't make it worse by sending out a confusing, overly technical or outright alarming letter to your customers.

in 46 states, companies that have suffered a data breach are required to send letters to all affected parties whose personal identifying information has been compromised.

You want - and need - them to read the letter, so how do you make the letter as helpful and appealing as possible?

To read this article in its entirety, please click: 

How to Inform Customers of a Data Breach
Six Tips to Protect Your Personal Data After a Breach

 

    

Data breaches are an everyday occurence affecting millions of Americans every year. Just ask crafters who shop at Michaels' Stores, Sony PlayStation Network gamers and investors at Morgan Stanley Smith Barney.

They're all vulnerable to identity theft and other fraud because their personal identifiable information (PII), such as birth date or Social Security number, for example, was exposed. That information could be used to commit financial fraud.

What should you do if this happens to you?

 

To read this article in its entirety, please click: 

 Six Tips to Protect Your Personal Data After a Breach

 

 

 

 

 

 

 
RiskIT Logo 
is an email publication provided by

 

Eminere Group Logo 

 

Disaster Recovery Journal

 

 

 

ISACA Logo

 

 

 

 HIMSS Logo

 

 

More Useful Links...
  
  
  
  
  
  
  
  
  
Join Our Mailing List