Blog
How to Prevent Security Breaches Using Technical Safeguards
Technical safeguards are security controls that protect security-sensitive information and are carried out via technology or managed by technology.
How to Prevent Security Breaches Using Physical Safeguards
Physical safeguards include business policies, procedures, and record-keeping required to protect a Covered Entity’s physical facilities and equipment.
An Exploration of Security Law Compliance
Most security-related laws mandate the implementation of security controls to protect security-sensitive information.
The Security Risks of Advanced IoT Devices and Powerful Mitigation Strategies
Learn the security risks involved in advanced IoT devices and how powerful mitigation strategies can keep your personal and private data safe.
Communicating Your AI and Robotics Products’ GDPR Compliance
The European Union’s GDPR privacy and security law creates firm limits and regulates how companies can collect, store, use, share and access personal data.
Technology's Synergistic Effects
AI and robotics shouldn’t be looked at in isolation to each other, to themselves, or to other types of technologies.
Privacy and Security in Robotics and AI Systems
Privacy within AI and robotics systems involves the personal data of individuals and how that data is collected, how it’s used, and with whom it’s shared.
Ethics in the Age of AI
One of the hot topics today that we're facing is looking at the ethical and moral implications of using artificial intelligence systems and robots.
Compliance Driven Product Development: Keeping Your Business and Your Customers Safe
In creating best development practices, it’s important to be inclusive in your approach. Developing and then marketing and selling a product will most likely end up involving every business unit; with that in mind, you need to make sure to include leaders or representatives from all affected units so that they can drive their divisions towards the common goal.
Does the GDPR Satisfy All Other Privacy Laws?
Tech companies in Silicon Valley that do business in Europe are in an especially difficult situation of satisfying the demands of potentially three masters, primarily federal requirements on specific sectors, California’s own data privacy and security laws, and those in force by the European Union.
Data Disposal – a Key to HIPAA Security
The covered entity or business associate must have policies and procedures to ensure PHI cannot be inadvertently disclosed during or after disposal or reuse of its storage media.
Information Security Requirements in GDPR
Unlike laws such as the U.S. federal Health Insurance Portability and Accountability Act (HIPAA) security regulations in the healthcare field, GDPR does not attempt to offer a complete list of security controls a controller or processor would need to implement.
Connected Car Security Vulnerabilities
The Internet of Things is extending our digital lives to our cars, trucks, and other vehicles. This may lead to privacy, security, and other legal issues.
Legal Help for Your ISO 27001 Audit
In either case, the disconnect between the company’s security and whatever documentation the company adopted solely for the sake of getting through the ISO audit process creates a risk of liability if a breach occurs.