Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment HIPAA (Score 1) 1307

Taken from wiki. This is a breach on at least 3 HIPAA technical safeguards.

Technical Safeguards – controlling access to computer systems and enabling covered entities to protect communications containing PHI transmitted electronically over open networks from being intercepted by anyone other than the intended recipient.

Information systems housing PHI must be protected from intrusion. When information flows over open networks, some form of encryption must be utilized. If closed systems/networks are utilized, existing access controls are considered sufficient and encryption is optional.

Each covered entity is responsible for ensuring that the data within its systems has not been changed or erased in an unauthorized manner.

Data corroboration, including the use of check sum, double-keying, message authentication, and digital signature may be used to ensure data integrity.

Covered entities must also authenticate entities with which they communicate. Authentication consists of corroborating that an entity is who it claims to be.
Examples of corroboration include: password systems, two or three-way handshakes, telephone callback, and token systems.

Covered entities must make documentation of their HIPAA practices available to the government to determine compliance.

In addition to policies and procedures and access records, information technology documentation should also include a written record of all configuration settings on the components of the network because these components are complex, configurable, and always changing.

Documented risk analysis and risk management programs are required. Covered entities must carefully consider the risks of their operations as they implement systems to comply with the act. (The requirement of risk analysis and risk management implies that the act’s security requirements are a minimum standard and places responsibility on covered entities to take all reasonable precautions necessary to prevent PHI from being used for non-health purposes.)

Comment Re:Reminder (Score 1) 469

I may be a minority w/ this thought process, but if I get screwed over by a company once, I'll never buy from them ever again. I can understand if you make a mistake, or your webcode is bugged but if you go out of your way to ruin my experience for profit pushing shareholders then I could care less for your product. I feel bad for Bioware, I really do. I know their policy was not this bad before the EA acquisition but I agree w/ the banned user; they sold their soul to the EA devil. When Bioware was not EA, I remember having lost a Neverwinter key and when I emailed them of the issue, they simply gave me a new one. Try doing that w/ EA...

Thank you for dredging up horrible memories of past EA incompetence. I agree w/ the list w/ the exception of online accounts. WoW and other such online accounts can be resold and often add value to the particular account. Now if you were to say something like the Mass Effect online account, then yes, that setup was beyond terrible and seems non-transferable.

UC

Comment Re:A better policy.... (Score 2, Funny) 209

"Aha ha ha. Oh, gosh that's funny. That's really funny. Do you write your own material? Do you? Because that is so fresh. You are the weakest link goodbye. You know, I've never heard anyone make that joke before. Mmm. You're the first. I've never heard anyone reference, reference that outside the program before. Because that's what she says on the show right? Isn't it? You are the weakest link goodbye. And yet, you have taken that and used it out of context, to insult me in this everyday situation. God what a clever, smart girl you must be, to come up with a joke like that all by yourself. Mmm, that's so fresh too. Any titanic jokes you want to throw at me while we're hitting these at the height of their popularity? Hmm? Cause... I'm here. God you're SO funny."

Comment Disconnect v Drop (Score 3, Insightful) 300

TFA explains first that 10000 calls were dropped but the investigation showed that it was 10000 calls failing to connect. Isn't this two completely different situations? The first being the customer connecting then being disconnected and the second never actually connecting. I could see someone failing to connect at all then attempt to dial multiple times in quick succession...

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...