Loughlin et al., 2020 - Google Patents
NCH Healthcare System Data Breach NotificationLoughlin et al., 2020
- Document ID
- 18121982840408629951
- Author
- Loughlin R
- Sandtick K
- Publication year
External Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Loughlin et al. | NCH Healthcare System Data Breach Notification | |
Pay | Talus Pay Data Security Incident Notification | |
Sherman et al. | Yeshiva University Data Security Incident Notification | |
Finn | Readerlink Data Breach Notification | |
Hildebrand | Associated Press Stylebook Data Breach Notification | |
Maddux | Advocates, Inc. Data Security Incident Notification | |
Pardus | Blackstone Valley Community Health Care Data Security Incident Notice | |
Moore | De Rigo Rem Data Security Incident Notification | |
Wright et al. | Minuteman Senior Services Data Breach Notification | |
Wanger et al. | OTR Leasing Data Security Incident Notification | |
Packel et al. | EmPower HR Data Security Incident Notification | |
Schultz | DialAmerica Marketing Data Security Incident Notification | |
Dilenno et al. | Absher Construction Company Data Breach Notification | |
Sherry | Princeton University Data Breach Notification | |
Phelps | Merlin Cyber Data Security Incident Notification | |
Goldstein et al. | McMillan Metro Data Security Incident Notification | |
Donovan | TradeSource, Inc. Data Breach Notification | |
Santistevan | Salud Family Health Data Breach Notification | |
Botas | Eisai Inc. Data Breach Notification | |
Munson | Landmark Admin LLC Data Security Incident Notification | |
Social Security Administration | Unemployment Insurance Fraud Consumer Protection Guide | |
Regan et al. | National Western Life Group Data Breach Supplemental Notice | |
Gutsin | Mason Tenders' District Council Funds Data Security Incident Notification | |
Navin | Pulte Mortgage Data Security Incident Notification | |
Madeley | Enforcement Notice: Swale Community Leisure & Data Protection Act 2018 |