Faruki Blog

Getting Familiar with the HIPAA Data Breach Notification Rule (Part 3)

In previous installments, we have discussed two critical components of handling a breach of protected health information ("PHI") under HIPAA: .. Read More

Getting Familiar with the HIPAA Data Breach Rule (Part 2)

A while back, we began a series on de-mystifying the privacy healthcare law juggernaut that is the Health Insurance Portability and Accountability.. Read More

Holiday Hospitality -- Ways to Protect Yourself if You Are Fortunate to Get a Room at the Inn

Holiday travel is ramping up. And so are hackers looking to prey upon one of their favorite targets, the hospitality industry. Every year, the.. Read More

It is That Time of Year....

As we head into the holidays, we begin to take stock of the year and make a myriad of resolutions for the New Year. Well, the same should be true in.. Read More

You Guessed It, More Data Breaches!

Data security has been a hot topic these last twelve months, with the Office of Personnel Management, Neiman Marcus, and Ashley Madison all making.. Read More

Data Breaches May Occur in the Smallest Places

Anyone watching the news over the past years and several months has heard about major data breaches at the federal government, Sony, Anthem, and.. Read More

The EU rejects Safe Harbor: Stunning? Really? Nah.

If you do a Google search on the recent decision handed down by the Grand Chamber of the European Court of Justice in Schrems v Data Protection.. Read More

Customer Identity Theft & Fraud: What Consumers Can Learn

I recently wrote a series of episodes in what I called a Privacy Miniseries on LinkedIn in which I shared the true story of my best friend.. Read More

Customer Identity Theft & Fraud: What Businesses Can Learn

I recently wrote a series of episodes in what I called a Privacy Miniseries on LinkedIn in which I shared the true story of my best friend.. Read More