Connecticut Data Encryption: Senator To Propose Required Encryption For Insurance Companies.

It looks like Connecticut could be following in the footsteps of New Jersey: according to stamford.dailyvoice.com, state senators are considering proposing legislation that would require Insurance companies to encrypt any sensitive personal data.   If said proposal passes, it would become the second state I know of that makes it mandatory for insurance companies to use […] read more

Data Breach Law: Wyoming Updates Laws On Data Privacy.

Wyoming has approved two Senate bills that update the state’s data privacy laws.  Senate Files 35 and 36 expand on the definition of what constitutes a breach of personal information, and what steps organizations must take when a data breach takes place.  Missing from the update: a safe harbor clause that would protect organizations if […] read more

Smartphone Security: Phone Theft Drops In Cities As Kill Switches Take Hold.

Reuters is reporting the unsurprising news that London, New York City, and San Francisco are seeing dramatic drops in smartphone thefts after the implementation of kill switches on devices became mandatory.  The ability to encrypt the contents of these devices has existed for years (via smartphone encryption that came either turned on by default or […] read more

Encryption vs. Cyberinsurance: One’s Risk Management, The Other’s Risk Transfer.

The Anthem data breach is turning out to be big not only in terms of number of people affected.  According to pymnts.com, quoting ft.com, Lloyd’s of London has stated that cyber attacks are “now too big for private insurance companies to handle” after details of Anthem’s hack were revealed.  This is another development that should […] read more

HIPAA Encryption: Anthem Didn’t Encrypt Data Stolen In Massive Hack.

The wsj.com points out in an article that Anthem Inc, the health insurer that recently announced a massive data breach potentially affecting 80 million people, did not use health data encryption to secure the data that was stolen.  It also points out that applying encryption can be a “balancing act between protecting the information and […] read more