Posted inData Privacy

Weighing Risks, Benefits of Cloud Computing and SaaS

As cloud computing and software-as-a-service increase in popularity, concerns are growing over the control and security issues that come with adoption of the technologies. Two recent reports offer fresh insight into how companies are adapting to cloud computing and software-as-a-service, commonly known as “SaaS.” Overall, the reports show companies increasingly realize the benefits of such […]

Posted inData Privacy

How to Avoid a Data Breach Disaster

A few years ago, a laptop containing encrypted information was stolen from the apartment of an employee at Canandaigua National Bank & Trust, creating a potentially large breach of sensitive customer information. When Canandaigua management heard about the theft, the company’s 14-member security team conducted a breach assessment and came up with a disaster recovery […]

Posted inInternal Controls

SAS 70 Reports, in Harsh Spotlight Again

A recent analyst report is reminding the compliance community yet again that so-called SAS 70 reports—the supposedly formal assurances software vendors give to corporate customers about their own internal controls—should be viewed with a skeptical eye. Analysts Jay Heiser and French Caldwell, both research vice presidents at Gartner, say some vendors (and even some of […]

Posted inData Privacy

Must-Read: Major HIPAA Changes Out for Comment

Healthcare compliance officers take note: Sweeping changes to the privacy rules under the Health Insurance Portability and Accountability Act are out for comment. The Department of Health and Human Services has published proposed rulemaking that will significantly modify the HIPAA Privacy, Security, and Enforcement Rules. The proposals are out for a 60-day comment period after […]

Posted inInternal Controls

Four Steps to Better Privacy Compliance

The floodgates of guidance about Massachusetts’ new data privacy regulations are officially open. The new rules, bureaucratically known as 201 CMR 17.00, took effect March 1 and are widely considered to be the toughest privacy standard in the nation. They apply to any company that “owns or licenses” personal information—whether stored in electronic or paper […]

Gift this article