The U.K. government's legal justification for spying en masse on British residents' online communications - Google searches, Facebook posts, Webmail - is questioned by privacy and Internet law experts as part of a case triggered by Edward Snowden's leaks.
While P.F. Chang's China Bistro has warned customers that their card information may have been compromised in a data breach, several fraud experts say they have yet to see a related increase in fraud. Learn the latest developments.
Healthcare entities should not write business associate agreements with provisions that go beyond HIPAA privacy and security regulations, says attorney Gerry Hinkley, who discusses HIPAA Omnibus Rule compliance issues.
A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
It's well known that lost or stolen unencrypted computing devices account for the majority of large health data breaches. But a new report from the Department of Health and Human Services shines a light on how frequently breaches - especially smaller ones - involve paper records.
A U.S. House committee is investigating security firm Tiversa over allegedly inaccurate information it provided to the Federal Trade Commission in its battle with medical test lab LabMD over data security.
The U.S. federal government's top telecommunications regulator is proposing a "new regulatory paradigm" by calling on communications providers to step up and assume new responsibilities to manage cyber-risks.
Joy Pritts, the first chief privacy officer at the Office of the National Coordinator for Health IT, is leaving the job after four years in the position. The move comes as ONC is revamping its structure.
Although restaurant chain P.F. Chang's has not yet confirmed a breach, several researchers say they believe the chain suffered a malware attack similar to those that compromised Target, Neiman Marcus and Sally Beauty.
Breaking down silos should help organizations mitigate vulnerabilities introduced into their systems from the information and communications technology supply chain, says the co-author of new guidance from NIST.