Horizon BCBSNJ HIPAA Charge Over Two Laptops Settled For $1.1 Million.

Horizon Blue Cross Blue Shield of New Jersey (Horizon BCBSNJ) has settled a data breach that affected approximately 690,000 New Jersey residents. This data breach was noted on this blog not too long ago: In January, the Third Circuit Appellate Court declared that a lawsuit against the insurer could proceed because the “improper disclosure” of […] read more

Laptop Encryption: Chesapeake Public Schools Laptop Theft Affects Over 10,000 Employees.

According to a couple of sources, Chesapeake Public Schools in Virginia is notifying employees about a potential data breach. Per their announcement, nearly 11,000 people could be affected by the theft of a laptop computer. It appears that laptop encryption software was not used to protect the contents. Password protection, however, was used. Assuming that […] read more

Gibberish = Encryption? Not By A Long Shot.

As the world descends into utter chaos, I take comfort in knowing that people are generally very levelheaded. It doesn’t quite always work that way, but seeing how North Korea’s government lives another day to threaten the flooding of Seoul in a sea of fire; or that European countries haven’t copped out to what some […] read more

College Professor’s Laptop Stolen From Car, Causes Data Breach.

They say that car break-ins are a crime of opportunity: not even the thieves know when or where it will happen, or which car or what types of articles will be filched. Well, I’ve just run across the ultimate opportunistic crime: Westmont College, in California, has announced that a professor’s laptop computer was stolen while […] read more

New York Data Security Law: AG Pursuing Law Updates, Will Introduce Safe Harbor.

New York Attorney General Eric T. Schneiderman announced last week that he will be pursuing updates to the state’s data security laws.  Among the proposals are changes to the legal definition of “personal information”; introducing safe harbor for companies that meet security standards; and encouraging the sharing of forensic data.  It sounds as if security […] read more