SlideShare a Scribd company logo
CA Supreme Court Declines Breach Cases - GovInfoSecurity http://www.govinfosecurity.com/ca-supreme-court-declines-breach-cases... 
CA Supreme Court Declines Breach Cases 
No Proof in Either Case of Unauthorized Data Viewing 
By Marianne Kolbasuk McGee, October 24, 2014. Follow Marianne @HealthInfoSec 
The California Supreme Court has declined to hear 
appeals in data breach class action lawsuits against 
Sutter Health and Eisenhower Medical Center. The 
action lets stand previous court rulings that determined the 
healthcare providers were not liable for the breaches 
under the state's Confidentiality of Medical Information Act 
because there was no proof that patients' medical data 
was actually inappropriately viewed. 
The two separate cases involve 2011 thefts of unencrypted computing devices 
from the California-based healthcare organizations. 
The Sutter incident, affecting about 4.2 million individuals, involved the theft of an 
unencrypted desktop computer from an administrative office. Some 13 class 
action lawsuits against Sutter had been consolidated. 
The Eisenhower Medical Center incident, which affected 500,000 patients, 
involved the theft of an unencrypted desktop computer from the Rancho Mirage, 
Calif., hospital. 
Each of the healthcare providers faced potential damages of up to $1,000 per 
breach victim under CMIA. 
Appellate Court Decisions 
In both cases, appellate courts ruled earlier this year that the healthcare 
providers were not liable under CMIA, and the plaintiffs appealed to the California 
Supreme Court. "In both matters, that means the court of appeals decisions 
stand," says attorney Beth Diamond, claims team leader at Beazley Group, 
which provided breach response insurance coverage to both Sutter and 
Eisenhower Medical Center. 
The California Supreme Court declined on Oct. 15 to hear an appeal in the 
Sutter Health case, which could have resulted in a potential judgment totaling 
more than $4 billion under CMIA (see Sutter Health Breach Suit Dismissed). 
An appellate court had ruled Sutter was not liable because the plaintiffs did not 
1 of 3 10/24/2014 10:48 PM
CA Supreme Court Declines Breach Cases - GovInfoSecurity http://www.govinfosecurity.com/ca-supreme-court-declines-breach-cases... 
allege the stolen information was actually viewed by an unauthorized person. 
"The case is effectively over and we are very disappointed that the California 
Supreme Court did not choose to review a court of appeals decision that rewrote 
the statute and left consumers with no effective remedies in our case," says 
attorney John R. Parker Jr., of law firm Kershaw, Cutter & Ratinoff LLP, which 
represented plaintiffs in the Sutter case. 
"Sutter Health is pleased with the California Supreme Court decision," a 
spokesperson for the organization says. "We can't speculate on future legal 
action." 
The state supreme court also recently declined to hear an appeal of the lawsuit 
against Eisenhower Medical Center. An appellate court had ruled in May that the 
healthcare provider was not liable under CMIA for the release of patients' 
personal information because a patient index backup file on the stolen computer 
did not include information about medical histories, conditions or treatments. In 
that case, Eisenhower faced a potential total judgment of about $500 million 
under CMIA (see Court: Breach Didn't Violate State Law). 
"The high court's refusal to hear the Eisenhower and Sutter appeals reflects the 
trend toward harmonization of California - CMIA - and federal law - HIPAA - 
regarding the consumer's privacy rights in their health information," says attorney 
Kathryn Coburn of law firm Cooke Kobrick & Wu LLP, which is not involved in 
either case. "The California appellate court noted in the Eisenhower case that 
the circumstances of the breach must include 'unauthorized viewing' in order for 
the plaintiff to recover nominal damages. HIPAA doesn't even allow for a private 
right of action by the consumer." 
Although the CMIA-related claims in the Eisenhower case have been decided, 
attorney Alan Harris of Harris & Ruble, which is representing the plaintiffs in the 
lawsuit, says the legal action will continue on other claims, including complaints 
that Eisenhower delayed in notifying law enforcement and plaintiffs about the 
theft of the unencrypted computer. A trial date for that part of the lawsuit has not 
been set yet, he says. 
2 of 3 10/24/2014 10:48 PM
CA Supreme Court Declines Breach Cases - GovInfoSecurity http://www.govinfosecurity.com/ca-supreme-court-declines-breach-cases... 
ARTICLE 
DHS Cybersecurity 
Recruit Bill Progresses 
A bill designed to help 
strengthen the cybersecurity 
workforce at the Department 
of Homeland... 
3 of 3 10/24/2014 10:48 PM

More Related Content

What's hot

Insurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsInsurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denials
Outsource Strategies International
 
What you can do online at the social security administration website
What you can do online at the social security administration websiteWhat you can do online at the social security administration website
What you can do online at the social security administration website
mosmedicalreview
 
Health Care Technology And Privacy
Health Care Technology And PrivacyHealth Care Technology And Privacy
Health Care Technology And Privacy
Scott Fikes
 
Medical Billing 1
Medical Billing 1Medical Billing 1
Medical Billing 1
Karna *
 
What is this Marketplace and Why Should I Care?
What is this Marketplace and Why Should I Care?What is this Marketplace and Why Should I Care?
What is this Marketplace and Why Should I Care?
Steve Levine
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
- Mark - Fullbright
 
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Mary Inman
 
The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...
The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...
The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...
Mary Inman
 
Social Security Disability Claim
Social Security Disability ClaimSocial Security Disability Claim
Social Security Disability Claim
ssdapplication14
 
Medical Billing Simple Manual
Medical Billing Simple ManualMedical Billing Simple Manual
Medical Billing Simple Manual
Karna *
 
Medical Billing 101
Medical Billing 101Medical Billing 101
Medical Billing 101
Alexander John Lau
 
Medical billing procedures manual
Medical billing procedures manualMedical billing procedures manual
Medical billing procedures manual
Kuldeep Rawat
 
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
Jessica Parker
 
Medical Negligence Claims - Medical Negligence
Medical Negligence Claims - Medical NegligenceMedical Negligence Claims - Medical Negligence
Medical Negligence Claims - Medical Negligence
medicalnegligencedirect
 

What's hot (14)

Insurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsInsurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denials
 
What you can do online at the social security administration website
What you can do online at the social security administration websiteWhat you can do online at the social security administration website
What you can do online at the social security administration website
 
Health Care Technology And Privacy
Health Care Technology And PrivacyHealth Care Technology And Privacy
Health Care Technology And Privacy
 
Medical Billing 1
Medical Billing 1Medical Billing 1
Medical Billing 1
 
What is this Marketplace and Why Should I Care?
What is this Marketplace and Why Should I Care?What is this Marketplace and Why Should I Care?
What is this Marketplace and Why Should I Care?
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
 
The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...
The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...
The Calm Before the Storm: Enforcement Trends in Risk Adjustment: DOJ and the...
 
Social Security Disability Claim
Social Security Disability ClaimSocial Security Disability Claim
Social Security Disability Claim
 
Medical Billing Simple Manual
Medical Billing Simple ManualMedical Billing Simple Manual
Medical Billing Simple Manual
 
Medical Billing 101
Medical Billing 101Medical Billing 101
Medical Billing 101
 
Medical billing procedures manual
Medical billing procedures manualMedical billing procedures manual
Medical billing procedures manual
 
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
 
Medical Negligence Claims - Medical Negligence
Medical Negligence Claims - Medical NegligenceMedical Negligence Claims - Medical Negligence
Medical Negligence Claims - Medical Negligence
 

Viewers also liked

Merck Millipore Peru - Lobby Lcd Energy Month
Merck Millipore Peru - Lobby Lcd Energy MonthMerck Millipore Peru - Lobby Lcd Energy Month
Merck Millipore Peru - Lobby Lcd Energy Month
Ivan Hernandez
 
Exterran holdings, inc.
Exterran holdings, inc.Exterran holdings, inc.
Exterran holdings, inc.
raja1233
 
Veterans Conference - SBDC
Veterans Conference - SBDCVeterans Conference - SBDC
Veterans Conference - SBDC
Small Business Development Center - Tucson
 
Blancas Sandoval & Associates, PA - Firm Profile
Blancas Sandoval & Associates, PA - Firm ProfileBlancas Sandoval & Associates, PA - Firm Profile
Blancas Sandoval & Associates, PA - Firm Profile
Carlos Sandoval, MBA
 
Extraits gazignaire
Extraits   gazignaireExtraits   gazignaire
Extraits gazignaireEUROPAGES
 
SIMA Snap Shot Report for Scott Rich
SIMA Snap Shot Report for Scott RichSIMA Snap Shot Report for Scott Rich
SIMA Snap Shot Report for Scott Rich
Scott Rich
 
The Foundations of Zamolxiana New Religious Movement - Octavian Sarbatoare
The Foundations of Zamolxiana New Religious Movement - Octavian SarbatoareThe Foundations of Zamolxiana New Religious Movement - Octavian Sarbatoare
The Foundations of Zamolxiana New Religious Movement - Octavian Sarbatoare
Octavian Sarbatoare
 
Operationalizing the promise of equity to improve Latino health - Matias Vale...
Operationalizing the promise of equity to improve Latino health - Matias Vale...Operationalizing the promise of equity to improve Latino health - Matias Vale...
Operationalizing the promise of equity to improve Latino health - Matias Vale...
Sea Mar Community Health Centers
 
W.U. School
W.U. SchoolW.U. School
W.U. School
worldup
 
Nada Eckhardt_Resume Manager
Nada Eckhardt_Resume Manager Nada Eckhardt_Resume Manager
Nada Eckhardt_Resume Manager
nada eckhardt
 
Project Management Training
Project Management TrainingProject Management Training
Project Management Training
bennettyang
 
Genius Corporate_PPT
Genius Corporate_PPTGenius Corporate_PPT
Genius Corporate_PPT
THARIKAJMAL IBRAHIM
 
CV Vipin Srivastava
CV Vipin SrivastavaCV Vipin Srivastava
CV Vipin Srivastava
Vipin Srivastava
 
Shellfish in the English Aquaculture strategy
Shellfish in the English Aquaculture strategyShellfish in the English Aquaculture strategy
Shellfish in the English Aquaculture strategy
Centre for Environment, Fisheries and Aquaculture Science (Cefas)
 
Do it Best Channellock Catalog
Do it Best Channellock CatalogDo it Best Channellock Catalog
Do it Best Channellock Catalog
Western-Building-Center
 

Viewers also liked (15)

Merck Millipore Peru - Lobby Lcd Energy Month
Merck Millipore Peru - Lobby Lcd Energy MonthMerck Millipore Peru - Lobby Lcd Energy Month
Merck Millipore Peru - Lobby Lcd Energy Month
 
Exterran holdings, inc.
Exterran holdings, inc.Exterran holdings, inc.
Exterran holdings, inc.
 
Veterans Conference - SBDC
Veterans Conference - SBDCVeterans Conference - SBDC
Veterans Conference - SBDC
 
Blancas Sandoval & Associates, PA - Firm Profile
Blancas Sandoval & Associates, PA - Firm ProfileBlancas Sandoval & Associates, PA - Firm Profile
Blancas Sandoval & Associates, PA - Firm Profile
 
Extraits gazignaire
Extraits   gazignaireExtraits   gazignaire
Extraits gazignaire
 
SIMA Snap Shot Report for Scott Rich
SIMA Snap Shot Report for Scott RichSIMA Snap Shot Report for Scott Rich
SIMA Snap Shot Report for Scott Rich
 
The Foundations of Zamolxiana New Religious Movement - Octavian Sarbatoare
The Foundations of Zamolxiana New Religious Movement - Octavian SarbatoareThe Foundations of Zamolxiana New Religious Movement - Octavian Sarbatoare
The Foundations of Zamolxiana New Religious Movement - Octavian Sarbatoare
 
Operationalizing the promise of equity to improve Latino health - Matias Vale...
Operationalizing the promise of equity to improve Latino health - Matias Vale...Operationalizing the promise of equity to improve Latino health - Matias Vale...
Operationalizing the promise of equity to improve Latino health - Matias Vale...
 
W.U. School
W.U. SchoolW.U. School
W.U. School
 
Nada Eckhardt_Resume Manager
Nada Eckhardt_Resume Manager Nada Eckhardt_Resume Manager
Nada Eckhardt_Resume Manager
 
Project Management Training
Project Management TrainingProject Management Training
Project Management Training
 
Genius Corporate_PPT
Genius Corporate_PPTGenius Corporate_PPT
Genius Corporate_PPT
 
CV Vipin Srivastava
CV Vipin SrivastavaCV Vipin Srivastava
CV Vipin Srivastava
 
Shellfish in the English Aquaculture strategy
Shellfish in the English Aquaculture strategyShellfish in the English Aquaculture strategy
Shellfish in the English Aquaculture strategy
 
Do it Best Channellock Catalog
Do it Best Channellock CatalogDo it Best Channellock Catalog
Do it Best Channellock Catalog
 

Similar to California supreme court declines to hear data breach cases

Trial Strategy: The Struggle over Perpetuating Testimony Before Litigation B...
Trial Strategy:  The Struggle over Perpetuating Testimony Before Litigation B...Trial Strategy:  The Struggle over Perpetuating Testimony Before Litigation B...
Trial Strategy: The Struggle over Perpetuating Testimony Before Litigation B...
NationalUnderwriter
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
Graeme Cross
 
WorkersCompensation
WorkersCompensationWorkersCompensation
WorkersCompensation
Jeremy Abay, Esq.
 
MedMal news
MedMal newsMedMal news
MedMal news
Steve Conlin
 
Notice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docxNotice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docx
dunhamadell
 
Notice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docxNotice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docx
honey725342
 
Court Says NJ Took Too Long For Subpoenas In FCA Claim
Court Says NJ Took Too Long For Subpoenas In FCA ClaimCourt Says NJ Took Too Long For Subpoenas In FCA Claim
Court Says NJ Took Too Long For Subpoenas In FCA Claim
Brian Dickerson
 
Current legal challenges facing healthcare
Current legal challenges facing healthcareCurrent legal challenges facing healthcare
Current legal challenges facing healthcare
wstarc5
 
(Filed) Petition for Writ of Cert.10.17.2016 copy
(Filed) Petition for Writ of Cert.10.17.2016 copy(Filed) Petition for Writ of Cert.10.17.2016 copy
(Filed) Petition for Writ of Cert.10.17.2016 copy
Carson J. Tucker, MSEL, JD
 
Wayne County et al. Petition for Writ of Certiorari
Wayne County et al. Petition for Writ of CertiorariWayne County et al. Petition for Writ of Certiorari
Wayne County et al. Petition for Writ of Certiorari
Carson J. Tucker, MSEL, JD
 
Heartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach LawsuitHeartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach Lawsuit
LegalDocs
 
HIPAA & OIG Compliance for Medical Billing Company Owners
HIPAA & OIG Compliance for Medical Billing Company OwnersHIPAA & OIG Compliance for Medical Billing Company Owners
HIPAA & OIG Compliance for Medical Billing Company Owners
Kareo
 
Chronology of Data Breaches
Chronology of Data BreachesChronology of Data Breaches
Chronology of Data Breaches
- Mark - Fullbright
 
Plaintiff’S Prima Facie Case
Plaintiff’S Prima Facie CasePlaintiff’S Prima Facie Case
Plaintiff’S Prima Facie Case
Michael Rosenberger
 
Legal Implications in Healthcare, Thomas Beimers - SLC 2015
Legal Implications in Healthcare, Thomas Beimers - SLC 2015Legal Implications in Healthcare, Thomas Beimers - SLC 2015
Legal Implications in Healthcare, Thomas Beimers - SLC 2015
American Academy of Family Physicians
 
2015 ABA_Conference_Qui_Tam_Defenses_panel
2015 ABA_Conference_Qui_Tam_Defenses_panel2015 ABA_Conference_Qui_Tam_Defenses_panel
2015 ABA_Conference_Qui_Tam_Defenses_panel
David Leviss
 
New Opportunities in Health Law
New Opportunities in Health LawNew Opportunities in Health Law
New Opportunities in Health Law
Craig B. Garner
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive Discussion
Joe Nathans
 
Nestlehutt Order Ga Caps
Nestlehutt Order Ga CapsNestlehutt Order Ga Caps
Nestlehutt Order Ga Caps
mzamoralaw
 
99818
9981899818

Similar to California supreme court declines to hear data breach cases (20)

Trial Strategy: The Struggle over Perpetuating Testimony Before Litigation B...
Trial Strategy:  The Struggle over Perpetuating Testimony Before Litigation B...Trial Strategy:  The Struggle over Perpetuating Testimony Before Litigation B...
Trial Strategy: The Struggle over Perpetuating Testimony Before Litigation B...
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
 
WorkersCompensation
WorkersCompensationWorkersCompensation
WorkersCompensation
 
MedMal news
MedMal newsMedMal news
MedMal news
 
Notice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docxNotice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docx
 
Notice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docxNotice This opinion is subject to correct.docx
Notice This opinion is subject to correct.docx
 
Court Says NJ Took Too Long For Subpoenas In FCA Claim
Court Says NJ Took Too Long For Subpoenas In FCA ClaimCourt Says NJ Took Too Long For Subpoenas In FCA Claim
Court Says NJ Took Too Long For Subpoenas In FCA Claim
 
Current legal challenges facing healthcare
Current legal challenges facing healthcareCurrent legal challenges facing healthcare
Current legal challenges facing healthcare
 
(Filed) Petition for Writ of Cert.10.17.2016 copy
(Filed) Petition for Writ of Cert.10.17.2016 copy(Filed) Petition for Writ of Cert.10.17.2016 copy
(Filed) Petition for Writ of Cert.10.17.2016 copy
 
Wayne County et al. Petition for Writ of Certiorari
Wayne County et al. Petition for Writ of CertiorariWayne County et al. Petition for Writ of Certiorari
Wayne County et al. Petition for Writ of Certiorari
 
Heartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach LawsuitHeartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach Lawsuit
 
HIPAA & OIG Compliance for Medical Billing Company Owners
HIPAA & OIG Compliance for Medical Billing Company OwnersHIPAA & OIG Compliance for Medical Billing Company Owners
HIPAA & OIG Compliance for Medical Billing Company Owners
 
Chronology of Data Breaches
Chronology of Data BreachesChronology of Data Breaches
Chronology of Data Breaches
 
Plaintiff’S Prima Facie Case
Plaintiff’S Prima Facie CasePlaintiff’S Prima Facie Case
Plaintiff’S Prima Facie Case
 
Legal Implications in Healthcare, Thomas Beimers - SLC 2015
Legal Implications in Healthcare, Thomas Beimers - SLC 2015Legal Implications in Healthcare, Thomas Beimers - SLC 2015
Legal Implications in Healthcare, Thomas Beimers - SLC 2015
 
2015 ABA_Conference_Qui_Tam_Defenses_panel
2015 ABA_Conference_Qui_Tam_Defenses_panel2015 ABA_Conference_Qui_Tam_Defenses_panel
2015 ABA_Conference_Qui_Tam_Defenses_panel
 
New Opportunities in Health Law
New Opportunities in Health LawNew Opportunities in Health Law
New Opportunities in Health Law
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive Discussion
 
Nestlehutt Order Ga Caps
Nestlehutt Order Ga CapsNestlehutt Order Ga Caps
Nestlehutt Order Ga Caps
 
99818
9981899818
99818
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 

Recently uploaded (20)

Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 

California supreme court declines to hear data breach cases

  • 1. CA Supreme Court Declines Breach Cases - GovInfoSecurity http://www.govinfosecurity.com/ca-supreme-court-declines-breach-cases... CA Supreme Court Declines Breach Cases No Proof in Either Case of Unauthorized Data Viewing By Marianne Kolbasuk McGee, October 24, 2014. Follow Marianne @HealthInfoSec The California Supreme Court has declined to hear appeals in data breach class action lawsuits against Sutter Health and Eisenhower Medical Center. The action lets stand previous court rulings that determined the healthcare providers were not liable for the breaches under the state's Confidentiality of Medical Information Act because there was no proof that patients' medical data was actually inappropriately viewed. The two separate cases involve 2011 thefts of unencrypted computing devices from the California-based healthcare organizations. The Sutter incident, affecting about 4.2 million individuals, involved the theft of an unencrypted desktop computer from an administrative office. Some 13 class action lawsuits against Sutter had been consolidated. The Eisenhower Medical Center incident, which affected 500,000 patients, involved the theft of an unencrypted desktop computer from the Rancho Mirage, Calif., hospital. Each of the healthcare providers faced potential damages of up to $1,000 per breach victim under CMIA. Appellate Court Decisions In both cases, appellate courts ruled earlier this year that the healthcare providers were not liable under CMIA, and the plaintiffs appealed to the California Supreme Court. "In both matters, that means the court of appeals decisions stand," says attorney Beth Diamond, claims team leader at Beazley Group, which provided breach response insurance coverage to both Sutter and Eisenhower Medical Center. The California Supreme Court declined on Oct. 15 to hear an appeal in the Sutter Health case, which could have resulted in a potential judgment totaling more than $4 billion under CMIA (see Sutter Health Breach Suit Dismissed). An appellate court had ruled Sutter was not liable because the plaintiffs did not 1 of 3 10/24/2014 10:48 PM
  • 2. CA Supreme Court Declines Breach Cases - GovInfoSecurity http://www.govinfosecurity.com/ca-supreme-court-declines-breach-cases... allege the stolen information was actually viewed by an unauthorized person. "The case is effectively over and we are very disappointed that the California Supreme Court did not choose to review a court of appeals decision that rewrote the statute and left consumers with no effective remedies in our case," says attorney John R. Parker Jr., of law firm Kershaw, Cutter & Ratinoff LLP, which represented plaintiffs in the Sutter case. "Sutter Health is pleased with the California Supreme Court decision," a spokesperson for the organization says. "We can't speculate on future legal action." The state supreme court also recently declined to hear an appeal of the lawsuit against Eisenhower Medical Center. An appellate court had ruled in May that the healthcare provider was not liable under CMIA for the release of patients' personal information because a patient index backup file on the stolen computer did not include information about medical histories, conditions or treatments. In that case, Eisenhower faced a potential total judgment of about $500 million under CMIA (see Court: Breach Didn't Violate State Law). "The high court's refusal to hear the Eisenhower and Sutter appeals reflects the trend toward harmonization of California - CMIA - and federal law - HIPAA - regarding the consumer's privacy rights in their health information," says attorney Kathryn Coburn of law firm Cooke Kobrick & Wu LLP, which is not involved in either case. "The California appellate court noted in the Eisenhower case that the circumstances of the breach must include 'unauthorized viewing' in order for the plaintiff to recover nominal damages. HIPAA doesn't even allow for a private right of action by the consumer." Although the CMIA-related claims in the Eisenhower case have been decided, attorney Alan Harris of Harris & Ruble, which is representing the plaintiffs in the lawsuit, says the legal action will continue on other claims, including complaints that Eisenhower delayed in notifying law enforcement and plaintiffs about the theft of the unencrypted computer. A trial date for that part of the lawsuit has not been set yet, he says. 2 of 3 10/24/2014 10:48 PM
  • 3. CA Supreme Court Declines Breach Cases - GovInfoSecurity http://www.govinfosecurity.com/ca-supreme-court-declines-breach-cases... ARTICLE DHS Cybersecurity Recruit Bill Progresses A bill designed to help strengthen the cybersecurity workforce at the Department of Homeland... 3 of 3 10/24/2014 10:48 PM