• 0 Posts
  • 20 Comments
Joined 1 year ago
cake
Cake day: January 24th, 2025

help-circle

  • Actual rule: The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) held or maintained by regulated entities. The ePHI that a regulated entity creates, receives, maintains, or transmits must be protected against reasonably anticipated threats, hazards, and impermissible uses and/or disclosures. This publication provides practical guidance and resources that can be used by regulated entities of all sizes to safeguard ePHI and better understand the security concepts discussed in the HIPAA Security Rule.

    So at what point can a lawyer say that all the cloud breaches violate the “reasonably anticipated” rule?



















  • I was thinking this. With advances in text recognition, they can potentially filter all that data now. Since five eyes is essentially for industrial espionage, google first requiring access to source code to ensure compatibility, and that you can’t really turn off chrome web page sniffing (I have found the disabled chrome app still running, with “force stop” available,) all this makes more sense than the little bit they’d squeeze out of ad revenue chasing people who avoid chrome and google assistant. After all, it isn’t bad actors or people who already buy from google they are spending so much effort on - it is the tech competent.