Archive for the ‘privacy’ Category

ITAR Regulations {International Traffic in Arms Regulations}

    ITAR was enacted in 1976 to control the export of defense-related articles and services. It stipulates that non-US persons are not allowed to have logical or physical access to articles modulated by International Traffic in Arms Regulations; which…

Personal Data Breach Response Under GDPR

Data security is at the heart of the upcoming General Data Protection Regulation (GDPR). It sets strict obligations on data controllers and processors in matters pertaining data security while concurrently providing guidance on the best data security practices. And for…

Personal Data, PII and GDPR Compliance

  The countdown for the European Union’s General Data Protection Regulation (GDPR), which will go into full effect in May 2018, is coming to a close. GDPR aims to solidify the data privacy rights of EU residents and the requirements…

GDPR – Top 10 Things That Organizations Must Do to Prepare

May 25, 2018 – that’s probably the biggest day of the decade for the universe of data on the Internet. On this date, Europe’s data protection rules –  European General Data Protection Regulation (GDPR) – becomes enforceable. In 2012, the…

Sharing Large Medical Images and Files – Factors to Consider

According to data collected by the HHS Office for Civil Rights, over 113 million individuals were affected by protected health information breaches in 2015. Ninety-nine percent of these individuals were victims of hacking, while the remaining 1 percent suffered from…

Cloud Data Ownership | How Does It Affect You? | FileCloud

The future of the cloud seems bright, Cisco predicts that by 2018, 59% of cloud workloads will be created from Software As A Service (SaaS). While these statistics are optimistic, we cannot ignore a few concerns that stifle cloud adoption…

HIPAA Prescribed Safeguards for File Sharing

The Health Insurance Portability & Accountability Act (HIPAA) sets standards for protecting sensitive data of patients in the cloud. Any company which is dealing with PHI (protected health information) needs to ensure all of the required network, physical, and process…

US-EU Safe Harbor – Origin, Reasons to strike down, Implications

The US-EU Safe Harbor was a great framework that simplified operations of many organizations. Recently, US-EU Safe harbor was struck down due to series of accusations, threat to national security and mistrust between countries. The following three articles cover the…

Essential Tools for Cloud Security

Cloud computing is steadily growing to become the most expansive business platform in the world primarily because of its numerous benefits, among them scalability, cost effectiveness, mobility and increased security. Although 56% of entrepreneurs are reportedly optimistic about cloud security,…

Alternative to Microsoft OneDrive – Why FileCloud is better for Business File Sharing?

FileCloud competes with Microsoft OneDrive for business in the Enterprise File Sync and Share space(EFSS). Before we get into the details, I believe an ideal EFSS system should work across all the popular desktop OSes (Windows, Mac and Linux) and…