Now that 2016 has come to a close and we have started 2017, I wanted to take a moment to review some of the information security stories from last year, and provide some insight on how you can protect yourself from them in 2017 since those issues are not going away any day soon.
The Federal Information Security Management Act (FISMA) was originally released in December 2002 and established the importance of information security principles and practices within the Federal Government, noting that information security was “critical to the economic and national security interests of the United States.
Compliance with the requirements of the HIPAA Security Rule starts with understanding how it is constructed. The Security Rule is comprised of security standards and implementation specifications. Each Security Rule standard is a requirement: a covered entity must comply with all of the standards of the Security Rule with respect to the ePHI it creates, transmits or maintains.
A SOC (Service Organization Control) report is a report on controls at a service organization related to various types of subject matter, for example: controls that affect user entities’ financial reporting; controls that affect the security, availability, and processing integrity of the systems; or the confidentiality or privacy of the information processed for user entities’ clients.
The problem with passwords that humans come up with is that people want to create passwords they can easily remember. Most people do this so they don’t have to remember 100 passwords. I get it. Actually, it’s pretty much impossible (unless you have a photographic memory) to remember 100 passwords that are changing at various time intervals for all of the web sites and applications that you have accounts on.
Have you ever thought about what you would do if someone obtained access to all the information you stored electronically?
Type II engagements (for both SOC 1s and SOC 2s) require walkthroughs and testing of the controls in place at the service organization to be able to opine on the suitability of the design and the operating effectiveness during the period under review.
The Privacy Times. Privacy is a daily news topic with staying power as strong as we have ever seen it. Searching for the word “privacy” on any reputable news site will generate articles containing the day’s wide-ranging contributors—from Germany’s data protection authority ordering Google to change its data collection practices; to continued criticism of the U.S. […]
Every year as summer draws to a close, one of the most sought-after topics for discussion that clients, business associates, and others reach out to our firm about is regarding Gap Letters— sometimes called Bridge Letters.
Healthcare providers, payers, exchanges, and many service providers to the healthcare industry are under increased pressure to demonstrate their compliance with the security and privacy requirements of HIPAA.