Health Breach Notification Rule

Category: Presentations

Health Breach Notification Rule

Health Breach Notification Rule

Under the American Recovery and Reinvestment Act of 2009 (the “Recovery Act” or “the Act”), the Federal Trade Commission (“FTC”) or (“Commission”) must issue rules requiring vendors of personal health records and related entities to notify individuals when the security of their individually identifiable health information is breached. Accordingly, the FTC seeks comment on a […]

Health Information Exchanges and Endpoint Information Security

Health Information Exchanges and Endpoint Information Security

Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 22 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries. Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues,addressing diverse […]

Are you Googling your Client’s Privacy Away?

Are you Googling your Client’s Privacy Away?

Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 21 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries. Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues, addressing […]

How Google gathers information on you and your company OR Are You Googling Your Client’s Privacy Away?

How Google gathers information on you and your company OR Are You Googling Your Client’s Privacy Away?

Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 20 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries. Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues, addressing […]