Monthly Archives: January 2013
RBI’s responsibility in preventing Aadhar Misuse for Bank Frauds
I refer to the news report in Midday indicating a new modus operandi in the commission of a Bank fraud in India. This fraud has been committed as a combination of “Phishing”, “Security lapses at the victim’s Bank”, “Compromise of KYC by … Continue reading
Donot link Aadhar to your Bank account
I observed during the Aadhar registration process in Bangalore that by default the registrar was encouraging registrants to link their Bank accounts to the Aadhar application. Risk associated with such process has been highlighted by the fraud reported in Midday … Continue reading
Cloud Computing and ITA 2008
Though “Cloud Computing” has been on discussion for the last 4 to 5 years, the rate of adoption is considered slower than expected. One of the main reasons is that during this period while there are new developments in the … Continue reading
Risk Assessment, the ISO maze
Extensive promotion has made ISO 27001 the key recall when we think of “Risk Assessment”. No doubt ISO 27001 is the most popular ISMS framework. The fact that it lends itself to certification makes it attractive to organizations which want … Continue reading
HIPAA Final Rule 2013-Data Breach Notification
Data Breach Notification (DBN) has been one of the most contentious issues of HIPAA regulations. Presently breach of unsecured protected information either at the Covered Entity or at the Business Associate entity needs to be reported to the affected individuals, … Continue reading
HIPAA Final Rule 2013-Definitions
The HIPAA final rule 2013 made effective from March 26, 2013 makes a few important changes in the definitions. Firstly, the definition of “Business Associate” has been expanded to include “Patient Safety Organizations”. Hence Health Information Organizations (HIO), E-Prescribing Gateways, and … Continue reading