Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment IE 6 suspect? (Score 1) 398

"With usage of IE6 plummeting and concerns about its security well known, the inclusion of that browser seems suspect."

Well, gs.statcounter has IE6 listed 4th, and only beaten by newer versions of IE and one version of Firefox. My company (not Chase) tracks browsers by type/version, and more than 80% of clients identify themselves as IE6. It would be silly for us not to support IE6, just as I'm sure Chase is basing their decision on similar experience with client data. If alternative browser users want to tinker with their browser identity, they should make sure they're not identifying as IE6, or they're just contributing to the problem of IE6's continued support.

Comment Re:I agree (Score 3, Insightful) 138

I with you on it making sense. Also, if a lawyer feels really great about his chance of a victory and posts that he's about to win his case, the judge would see that update. Then if the judge rules in his favor it gives the appearance that the lawyer received foreknowledge of a ruling. If it doesn't go his way, the judge could be argued to have ruled the other way to avoid the appearance of impropriety.

It's easier to just separate them, because in every court case someone will be unhappy with the outcome and looking for something to blame it on.

Comment Re:Well... (Score 1) 1006

Actual reasons absolutely do matter. Beyond discrimination, there are other limitations as well, which is why I said it depends on the jurisdictions. Look up "At-will employment" on Wikipedia for an overview, then check your local state's laws. 43 states plus D.C. have exceptions based on public policy, for instance. "At-will" gives flexibility, not total immunity.

Making a reasonable case that a termination had the appearance of retaliation, even if it did not, will usually send the business to the settlement table. Employment rights offices will often require that both sides attempt to address the complaint outside of court. And in this age of "evil company must be punished," no company wants the public to hear that they retaliated against a whistleblower who was trying to bring to light that the company was breaking laws. If the company is public or regulated, it's a nightmare of future auditing, possible sanctions, and opening the door to class-action lawsuits. And any company doesn't want that kind of bad PR.

Comment Re:Well... (Score 1) 1006

Even if they come up with another reason, it would look like retaliation and they would likely lose in a court case (depending on the state). Some states favor the business, some favor the individual. Also, if you're already on a performance plan or under other disciplinary action for some other causes, retaliation is harder to prove.

But if you're a "good employee" and you're holding evidence that you tried to warn them about licensing issues and they terminate you when auditors show up for licensing confirmation, retaliation is likely enough that a good employment attorney will win the case, and even more likely get the business to settle before it even goes to a case, even in a "at-will employment" state.

Comment Re:It will apply to everyone (Score 1) 101

The commercial whole-disk encryption software we use works at the BIOS-level, rather than from within the OS. You can't mount the disks on a Linux system. Your statement that commercial encryption programs are for peace of mind rather than protection is a false generalization. Well-designed, well-implemented, *and* well-managed (must be all three) systems can provide excellent real protection of data.

Comment Re:Encryption methodology is defined (Score 4, Informative) 101

There's an excellent overview by a law firm here:

http://www.faegre.com/showarticle.aspx?Show=8969

"Previously, covered entities were obligated to mitigate harm caused by unauthorized disclosures of protected health information, but not required to give notice to the individuals whose information was inappropriately disclosed. Going forward, covered entities and business associates will be required to notify individuals when security breaches occur with respect to "unsecured" information. Unsecured information means information not protected through technology or methods designated by the federal government. In addition, if the breach involves 500 or more individuals, notice to the federal Department of Health and Human Services and the media is also required."

Comment Encryption methodology is defined (Score 5, Informative) 101

The method of encryption is defined in the law, adopts the standards set forth by the NIST, and there is a mechanism to update what is acceptable annually through published Guidances. This law is an improvement over what was previously in place. Read the HIPAA Security and Privacy rules as last updated in 2005, and then look at the major steps forward HITECH makes.

That future Guidances can update standards without having to send a law through Congress is also going to allow for future improvements in security, too. HITECH was part of the economic recovery act (ARRA), which shows how difficult it was for HIPAA to get updates - this had to be tacked onto an unrelated must-pass bill.

This article is from an encryption vendor who is stating that most encryption products are what he calls "point-to-point" encryption I bet he considers his own product to not be, thus it is superior, and thus HIPAA should require all companies to buy his products.

For those of you who think "encryption" is left up to the governed:

The HHS Guidance identifies four situations where paper or electronic data may be vulnerable to a breach, and suggests appropriate safeguards to secure the PHI:

                    - "Data at Rest". This is data that resides in databases, file systems, and other structured storage methods. The HHS Guidance points to the National Institute of Standards and Technology Special Publication 800-111, Guide to Storage Encryption Technologies for End User Devices as the approved methodology.
                    - "Data in Motion". This is data that is moving through a network, including wireless transmission. The HHS Guidance points to specific requirements in Federal Information Processing Standards (FIPS) 140-2 which include, as appropriate, standards described in NIST Special Publications 800-52, Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations; 800-77, Guide to IPsec VPNs; or 800-113, Guide to SSL VPNs, and may include others which are FIPS 140-2 validated.
                    - "Data Disposed". This is discarded paper records or recycled electronic media. The electronic media must have been cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization, such that the PHI cannot be retrieved. For discarded paper records, PHI would need to be shredded or destroyed in a manner that precludes reconstruction.
                    - "Data in Useâ. This is data in the process of being created, retrieved, updated or deleted. The encryption and destruction processes described above, along with the general HIPAA safeguards, will apply to all data in use.
 

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...