Government Reviews Health Care Contractors Data Security. Intel to Inform you.

An Office of Inspector General, Security Concerns, and health care contractors– Sound like a familiar mix?

Which health care contractors is the HHS OIG looking into? Medicare administrative contractors

What is the data security concern that is raised? the number of health care data gaps is INCREASING

Healthcare Dive | OIG report: More data security gaps at Medicare administrative contractors

INTERIM. 5 Bits Intel to Know about Stakeholders in Cyber Security Banking & Retailer Legislation.

Let’s peak into the Electronic Payments Coalition:

Electronic Payments Coalition- who are they?

  • payments industry stakeholders
  •  credit unions
  • community banks
  • trade associations
  • payment card networks
  • banks

What’s the point of the EPC? 

  • EPC protects the value, innovation, convenience, security and competition that exists in the modern electronic payments system

What’s the EPC saying about the federal Data Security Act of 2015 (H.R. 2205)​?

  • Retailers are wrong about their…

INTERIM. Health Care Data Security Bill. 4 Takeaways.

What 4 Ways does the Health & Human Services Data Protection Act protect health care data?

  • Creates the  Office of the Chief Information Security Officer (CISO) within HHS
  • Creates a data protection arrangement between the new CISO, the HHS General Counsel, & the HHS CIO
  • Keeps information technology & information security separate to ensure the highest level of security
  • Incentivizes better security to protect health care data

Health IT Security | Healthcare Cybersecurity Bill Introduced…

Attorney General Opinion: Data Retention. License Plate Readers. Procurement FAIL.

What is the question answered by Attorney General Opinion KP-0076? Whether Bowie County can engage a private company to use a license plate reader data looking for vehicles that don’t have liability insurance?

Is there a fee splitting arangement in this scenario? Yes, the vehcile owner will get a letter from the District Attorney office, and fees will be split 50-50 between the County and the company.

Can this fee splitting arrangement with automatic license plate readers…

INTERIM. Retailers v. Financial Institutions. Data Security Legislation Cage Fight. 4 Key Points Informed Intel

Retailers and Financial Institutions are like the Hatfields & the McCoys when it comes to federal data security legislation.  

Here’s what you need to know when this fight comes to your state legislature:

  • Fairness.  Retailers think it unfair to hold retialers to the financial institution standards for customer notification upon a data breach.
  • Impact Beyond Small Businesses. The impact of imposing financial institution standards on businesses will impact businesses large and small…

State Chief Information Officers Call for Improved State Data Security. 3 Key Informed Intel.

What group is calling for improved state data security systems? National Association of State Chief Information Officers

What sparked the call to arms? the cost of cyber crime world wide is $375 billion to $575 billion, which is labled a threat to democracy

What do the NASCIO propose states do? Create statewide cybersecurity ecosystem 

What would a statewide cybersecurity ecosystem link? 

  • state government

  • local government

  • federal government

  • higher…

3 Steps for a FitBit can Lead to a Conviction and Probation.

WHO WAS CONVICTED: A woman in Pennsylvania reported her rape to the police

WHAT EVIDENCE LED TO CONVICTION: When police came to the scene, they collected as evidence the woman’s fitbit found laying in a hallway

WHY DID THE EVIDENCE INDICATE GUILT: The woman claimed she had gone to sleep and was later attacked, but the data downloaded from the Fitbit indicated the woman was walking about at the time and logged her heart rate

Wall Street Journal | Prosecutors Say Fitbit Device Exposed…

Legal Trend: Sue over Data Breach. Can you remain anonymous?

No. Nien. Nyett. Nej. A federal judge ruled that people caught in the data breach at Ashley Madison cannot remain anonymous. 

Why did these plaintiffs want to be anonymous? Fear of the impact to the professional and personal lives.

Why did the court deny the request? Because the data breach is not equal to instances when a person can remain anonymous. Those instances are reserved for minors, rape, or other highly sensitive matters.

Washington Post | People suing Ashley Madison for…

Poll: 54% Trust Tech Companies More Than Government

A poll commissioned by The App Association reveals a distrust of government on data security issues.

The informed intel:

  • 54% trust tech companies to secure their personal information
  • 21% trust the government to secure their personal information
  • 7 in 10 believe hacking is increasing

The Hill | Poll: Voters trust tech companies ahead of FBI on data security

INTERIM. 4 Credit Card Processing Recommendations for TX House Committee on Investments & Financial Institutions.

The Credit Union National Association proposed the following changes to credit card processing in Texas to improve data security:

  • Data Security at Merchant Level. Require merchants receiving payment by credit or debit cards to protect the sensitive personal financial information they receive;
  •  Require Consumers to Notify Card Processors of Breaches. Require card recipients to notify their card processor immediately upon detecting a breach, and require the information be provided to the…