The National Association of Insurance Commissioners’ (NAIC) Cybersecurity Task Force released a revised draft of the Insurance Data Security Model Law (Model Law) last week. The Model Law’s goal is to “establish exclusive...more
9/7/2016
/ Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Security ,
Encryption ,
Insurance Industry ,
NAIC ,
NIST ,
Popular ,
Private Right of Action ,
Regulatory Oversight ,
Third-Party Service Provider
The National Association of Insurance Commissioners (NAIC) Cybersecurity Task Force released a revised draft of the Insurance Data Security Model Law (Model Law) last week. The Model Law’s goal is to “establish exclusive...more
9/2/2016
/ Comment Period ,
Cybersecurity ,
Data Breach ,
Data Security ,
Encryption ,
Federal Breach Notification Standard ,
Insurance Industry ,
NAIC ,
NIST ,
Private Right of Action ,
Third-Party Service Provider
Ladies and gentlemen, introducing the remote controlled contraceptive computer chip. Releasing measured doses of the levonorgestrel hormone, these computer chips can be implanted under a woman’s skin as a new form of birth...more
On August 11, 2015, the Online Trust Alliance (OTA) released an Internet of Things (IoT) Trust Framework (“the Framework”), which presents guidelines for IoT manufacturers, developers, and retailers. The Framework was...more
8/24/2015
/ App Developers ,
Code of Conduct ,
Data Privacy ,
Encryption ,
Internet of Things ,
Manufacturers ,
Microsoft ,
Operating System Developers ,
Privacy Policy ,
Retailers ,
Software Developers ,
Symantec