Companies risk being held ‘hostage’ by IT without proper IT process documentation
Written by Kevin McDonald, Alvaka Networks. Originally published April 2016 on TechTarget. Kevin discusses the crucial role of IT Process Documentation. It seems that not a day passes without news of another high-profile hack, embezzlement of monies and data, or even [...]
HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards
With all the recent headlines regarding cyber security breaches, it is easy for companies to forget about the physical security controls they must put into place. This crucial element of the HIPAA Security Rule will vary in implementation depending on [...]
Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches
By Oli Thordarson, CEO of Alvaka Networks I was recently asked to write a short column on “What three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches?” for the ABL Organization. It [...]
Legal quicksand: Shrink-wrap and click-wrap agreements – Part 2
Typical Shrink-Wrap Terms and Conditions While the type of terms and conditions found in shrink-wrap agreements vary greatly from vendor to vendor, there are a number of common themes. In general, shrink-wrap agreements include the following potentially problematic terms: [...]
Legal quicksand: Shrink-wrap and click-wrap agreements – Part 1
Shrink-wrap and click-wrap agreements are the fine print you see, among other things, when you click through terms and conditions in accessing an online service (e.g., in connection with a cloud computing service) or as part of the installation [...]
DFARS 252.204-7012: Terms to know
DFARS 252.204-7012 requires that, as a DoD contractor, your organization and your subcontractors must obtain certification of compliance. The deadline has now passed to meet DFARS compliance rules that put cybersecurity safeguards on what the U.S. government calls 'controlled unclassified [...]