Information overload. One of the key phenomena that has come to define the digital age. The consequences of this information glut cover a wide spectrum. From the analytical perspective, finding answers to important questions and identifying what constitutes … Read More
Privacy


California Consumer Privacy Act & NYDFS 23 NYCRR 201
Increasingly demanding data regulations. The trend has been the strongest factor affecting the world of IT over the past several years. Over the recent period, state, national, and international authorities have been producing legislation creating tight … Read More

What are the Data Protection Officer’s Tasks as Defined under EU GDPR?
What are the Data Protection Officer’s Tasks defined under EU GDPR? Article 39 Tasks of the Data Protection Officer (DPO) The data protection officer shall have at least the following tasks: (a) to inform and advise the controller or the … Read More

Notable Privacy News
Privacy Mandatory – Data Breach Notification in Australia Australia’s Data Breach Bill amends the Privacy Act 1988 (Cth) (“Privacy Act”) and requires private and public organisations regulated by the Privacy Act to notify affected individuals and the Australian Information … Read More
Free Healthcare Data Risk & Audit Preparedness Assessment
Can you meet all those compliance & regulatory requirements? Do understand your HIPAA Risk?
Risk Analysis is the first step in an organization’s Security Rule compliance effort. Risk Management is a requirement. GTB’s Healthcare Data Risk Assessment allows an organization to conduct an accurate and thorough risk analysis of the potential risks and vulnerabilities of a covered entity’s ePHI.
Utilizing the GTB Data Protection that Works platform, organization’s will be able to start the required security risk analysis and audit preparedness as mandated by the HIPAA Security Rules and the HIPAA Privacy and Breach Notification Rules … at a substantial savings!
Free HIPAA Risk Assessment · Identify & Classify Regulated ePHI Data to be controlled · Identify potential places where this information might leak – all outbound channels & ports need to be inspected, not just HTTP, Email and the usual Web protocols · Scan data stores & Endpoints (laptops, USB, local drives, etc.) for regulated ePHI, PII, PCI information · Apply Policies & Controls – automatically, in real-time · Enterprise Reporting – accurate and detailed for Auditors & Administrators · No Cost Implementation, Training, Support and Report Review And a lot more Try it out Contact GTB’s Compliance Assurance Services for more information and to receive our latest Case Study:
|