• First Reference
  • About us
  • Contact us
  • Blog Signup 📨

First Reference Talks

Discussions on Human Resources, Employment Law, Payroll and Internal Controls

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

data protection

By Occasional Contributors | 3 Minutes Read November 25, 2015

Hospital privacy breach results in OSC laying charges

The Ontario Securities Commission has announced a series of criminal and quasi-criminal charges following an investigation related to the misuse of confidential patient information from the Rouge Valley Health System and the Scarborough Hospital.

Article by Occasional Contributors / Business, Information Technology, Privacy / criminal and quasi-criminal charges, cybersecurity, data protection, health information custodians, Ontario Securities Act, Personal Health Information Protection Act 2004, privacy breach, The Ontario Securities Commission

By Jeffrey Sherman, MBA, FCPA, FCA | 4 Minutes Read March 3, 2014

What critical elements should appear in every third-party service provider contract?

Whenever data leaves the control perimeter of a company, there is a risk that the data will not be protected at the same level of security that is required by company policy. It is essential that data created, stored, manipulated or transmitted by a third party on the company’s behalf be accorded the level of protection that is defined by the company’s standards and policies.

Article by Jeffrey Sherman, MBA, FCPA, FCA / Business, Information Technology, Privacy / access to data, best practices, contingency planning, contract review, contracts, data control, data managment best practices, data protection, defaults and termination, Dispute resolution, insurance, legal compliance, ownership of data, performance measurements, pricing, reputational damage, subcontracting, third-party service providers

By Ron Richard | 5 Minutes Read December 3, 2012

Protecting sensitive data against the insider threat with data masking

With an overabundance of information being stored or created in electronic format, and various tools for turning data (i.e., personally identifiable information, intellectual property, credit card) into cash, goods, and other services, the risks of doing business have increased. We are hearing more and more about attacks where the target is sensitive data, and the perpetrators are those with elevated levels of trust and access within the business.

Article by Ron Richard / Business, Finance and Accounting, Privacy / best practices, Camouflage Software Inc., data masking, data protection, electronic format, encryption, Gartner, hackers, Information Technology PolicyPro, insider threat, insider threats, IT projects, Kevin Duggan, NIst, NL Government OCIO, Plato Consulting, Ponemon Institute, Protecting sensitive data, risk management, risks of doing business, SearchSecurity, software development, Testing, trust and access

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 4
  • Go to page 5
  • Go to page 6

Footer

About us

Established in 1995, First Reference is the leading publisher of up to date, practical and authoritative HR compliance and policy databases that are essential to ensure organizations meet their due diligence and duty of care requirements.

First Reference Talks

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

Main Menu

  • About First Reference
  • Resources
  • Contact us
  • 1 800 750 8175

Stay Connected

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

We welcome your comments on our blog articles. However, we do not respond to specific legal questions in this space.
We do not provide any form of legal advice or legal opinion. Please consult a lawyer in your jurisdiction or try one of our products.


Copyright © 2009 - 2023 · First Reference Inc. · All Rights Reserved
Legal and Copyright Notices · Publisher's Disclaimer · Privacy Policy · Accessibility Policy