The SC Insurance Data Security Act: Ask Some Questions to Evaluate Your Security Program

  • Determining how likely and how potentially damaging those threats may be, in view of how sensitive the NPI is;
  • Evaluating how well your policies, procedures, information systems, and other protections work in managing these threats;
  • Detecting, preventing, and responding to attacks, intrusions, and other system failures; and
  • Implementing safeguards identified in an ongoing risk assessment, and revisiting those safeguards at least annually.
  • the goals of an incident response plan,
  • defining roles, responsibility, and decision-making authority during an event,
  • identifying requirements for addressing weaknesses, and
  • documenting and reporting cybersecurity events and incident response activities.

--

--

--

Litigator, appellate advocate, regulatory and information technology attorney @adamsandreese, Information Privacy Professional (CIPP-US)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Burp Suite Tool — Overview and Usage

Your browsing history may be up for sale soon. Here’s what you need to know

It’s All “Backup” Nowadays? Wrestling With the Stored Communications Act

Recognize and avoid phishing

When Kirbi walks the Bifrost

Kirbi walking on a rainbow bridge (bifrost) to an AD environment

{UPDATE} Toy Robot War Hack Free Resources Generator

How to Protect Your WordPress Site from Brute Force Attacks with 4 key Tricks

<a href=””>A Forever Story</a>

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jack Pringle

Jack Pringle

Litigator, appellate advocate, regulatory and information technology attorney @adamsandreese, Information Privacy Professional (CIPP-US)

More from Medium

How is the Health of your Company’s Password Policies?

8 Important Questions To Ask Your Cybersecurity Integrator Before Signing

ASCII hacker GIF — at his desk and hacking — cybersecurity concept

Cybersecurity And Much More Newsletter — Week 02 (2022)

Update on my Journey in Information Security