[go: up one dir, main page]

Loughlin et al., 2020 - Google Patents

NCH Healthcare System Data Breach Notification

Loughlin et al., 2020

Document ID
18121982840408629951
Author
Loughlin R
Sandtick K
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Loughlin et al. NCH Healthcare System Data Breach Notification
Pay Talus Pay Data Security Incident Notification
Sherman et al. Yeshiva University Data Security Incident Notification
Finn Readerlink Data Breach Notification
Hildebrand Associated Press Stylebook Data Breach Notification
Maddux Advocates, Inc. Data Security Incident Notification
Pardus Blackstone Valley Community Health Care Data Security Incident Notice
Moore De Rigo Rem Data Security Incident Notification
Wright et al. Minuteman Senior Services Data Breach Notification
Wanger et al. OTR Leasing Data Security Incident Notification
Packel et al. EmPower HR Data Security Incident Notification
Schultz DialAmerica Marketing Data Security Incident Notification
Dilenno et al. Absher Construction Company Data Breach Notification
Sherry Princeton University Data Breach Notification
Phelps Merlin Cyber Data Security Incident Notification
Goldstein et al. McMillan Metro Data Security Incident Notification
Donovan TradeSource, Inc. Data Breach Notification
Santistevan Salud Family Health Data Breach Notification
Botas Eisai Inc. Data Breach Notification
Munson Landmark Admin LLC Data Security Incident Notification
Social Security Administration Unemployment Insurance Fraud Consumer Protection Guide
Regan et al. National Western Life Group Data Breach Supplemental Notice
Gutsin Mason Tenders' District Council Funds Data Security Incident Notification
Navin Pulte Mortgage Data Security Incident Notification
Madeley Enforcement Notice: Swale Community Leisure & Data Protection Act 2018