Tips When Using Mobile Devices for Financial Services
This article provides some tips for using your mobile device more safely and securely to help you achieve your financial goals.
This article provides some tips for using your mobile device more safely and securely to help you achieve your financial goals.
This article probed whether senior executives and board members were undertaking basic cyber governance activities, such as reviewing privacy and security budgets and top level policies, establishing key roles and responsibilities for privacy and security, and reviewing security program assessments in the United States.
The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”)1 and its implementing regulations (the “Privacy Rule”, the “Breach Notification Rule” and the “Security Rule”)2 establish security and privacy standards to ensure the confidentiality and integrity of Protected Health Information (“PHI”).3 Their application to Business Associates is summarized here.
This is a discussion of key securities law considerations for start-up or early-stage companies preparing to grant compensatory equity awards to employees, directors or other service providers.
Copyright and Trade Secrets License Agreement (Philippines)
This article addresses concerns regarding both the commercial aspects, and the access by the US public authorities, to data transferred from the European Union (EU).
The purpose of these guidelines is to help employees understand how company policies apply to newer technologies for communication, so you can participate with confidence not only on this blog, but in other social media platforms.
The principles and guidelines contained in this policy should be applied to all online activities.
This article summarises the legislative framework for the protection of personally<br />identifiable information (PII).
Privacy on the Go recommends a “surprise minimization” approach. This approach means supplementing the general privacy policy with enhanced measures to alert users and give them control over data practices that are not related to an app’s basic functionality or that involve sensitive information.