<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>By Laura Ames Archives - Zasio</title>
	<atom:link href="https://zasio.com/category/by-laura-ames/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/category/by-laura-ames/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Thu, 26 Feb 2026 00:06:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>By Laura Ames Archives - Zasio</title>
	<link>https://zasio.com/category/by-laura-ames/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations</title>
		<link>https://zasio.com/information-management-cybersecurity-lessons/</link>
					<comments>https://zasio.com/information-management-cybersecurity-lessons/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 05 Jan 2026 18:32:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Laura Ames]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=7601</guid>

					<description><![CDATA[<p>As cyber threats grow more sophisticated, businesses face mounting pressure to protect sensitive data and comply with evolving regulations. In examining New York’s response, we can identify some of the challenges in adopting rigorous information management cybersecurity policies as well as the importance of doing so. Information Management Cyber Attacks on the Rise and Legislative Responses Cyber-attacks have grown increasingly frequent and severe in recent years. The landscape of modern business includes rising numbers of employees working remotely and ever more reliance on e-commerce. These facts introduce more opportunities for cyber-attacks. In addition, perpetrators of these attacks have an increasing number of sophisticated tools at their disposal including AI-assisted technologies. These data breaches come with numerous consequences for businesses from reputational harm to financial losses. According to a study performed by IBM, data breaches cost companies an average of $4.9 million worldwide and nearly double that figure in the United States. In response to these threats numerous jurisdictions across the world have introduced legislation dealing with data security. In the U.S. alone, 49 states have introduced over 800 bills dealing with cybersecurity with more than 200 of these bills going on to be adopted. In particular, New York’s amendments to [&#8230;]</p>
<p>The post <a href="https://zasio.com/information-management-cybersecurity-lessons/" data-wpel-link="internal">Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As cyber threats grow more sophisticated, businesses face mounting pressure to protect sensitive data and comply with evolving regulations. In examining New York’s response, we can identify some of the challenges in adopting rigorous information management cybersecurity policies as well as the importance of doing so.</p>
<h4>Information Management Cyber Attacks on the Rise and Legislative Responses</h4>
<p>Cyber-attacks have grown increasingly frequent and severe in recent years. The landscape of modern business includes rising numbers of employees working remotely and ever more reliance on e-commerce. These facts introduce more opportunities for cyber-attacks. In addition, perpetrators of these attacks have an increasing number of sophisticated tools at their disposal including AI-assisted technologies. These data breaches come with numerous consequences for businesses from reputational harm to financial losses. According to a <a href="https://news.bloomberglaw.com/ip-law/cybersecurity-breaches-are-increasing-business-insolvency-risks" data-wpel-link="external" rel="external noopener noreferrer">study performed by IBM</a>, data breaches cost companies an average of $4.9 million worldwide and nearly double that figure in the United States.</p>
<p>In response to these threats numerous jurisdictions across the world have introduced legislation dealing with data security. In the U.S. alone, <a href="https://www.ncsl.org/technology-and-communication/cybersecurity-2025-legislation" data-wpel-link="external" rel="external noopener noreferrer">49 states</a> have introduced over 800 bills dealing with cybersecurity with more than 200 of these bills going on to be adopted. In particular, New York’s amendments to its regulations regarding cyber security recently came into effect.</p>
<h4>What do New York’s Information Management Cybersecurity Regulations Require?</h4>
<p>New York’s 23 NYCRR Part 500 applies to entities regulated by the state’s Banking, Insurance and Financial Services laws. The latest amendments became effective on November 1 and introduced robust cybersecurity measures:</p>
<ul>
<li>Annual risk assessments and compliance certifications</li>
<li>Written cybersecurity policies</li>
<li>Access privilege controls</li>
<li>Mandatory multifactor authentication for external network access</li>
<li>Asset inventory programs to track all information system assets</li>
<li>Secure disposal of nonpublic information when no longer necessary for business operations</li>
</ul>
<h4>Potential Challenges of Compliance</h4>
<p>These requirements ensure robust security and accurate tracking of information throughout its lifecycle, safeguarding data and retaining it for the appropriate duration. To comply with these requirements, businesses must not only adopt rigorous security measures but also have knowledge of what information the business has in its systems and where it is being stored. It also requires identifying all applications and information systems that store, transfer or process information including those of third-party vendors.</p>
<p>Even businesses not subject to New York’s Part 500 can adopt proactive measures to achieve best information management cybersecurity practices and avoid risk. Implementing access controls such as strong passwords and multifactor authentication is critical to preventing unauthorized access. Beyond technical solutions, ensuring that employees receive adequate phishing and cybersecurity awareness training helps strengthen an organization&#8217;s first line of defense against threats. Finally, businesses must create an incident response plan to ensure business continuity and recovery if the worst-case scenario does happen.</p>
<h4>Final Thoughts</h4>
<p>With cyber risks increasing in number and ranging from attempts to phish individuals to advanced ransomware attacks, <a href="https://zasio.com/records-and-information-management-information-security-two-risk-mitigation-peas-in-an-information-governance-pod/" data-wpel-link="internal">cybersecurity for records and information management</a> has become a business necessity.  However, these policies and procedures can be difficult to implement with existing information systems. Beyond adopting technical controls, businesses must have complete comprehension into what data it holds, where that data resides, and what applications process it. By adopting these measures businesses ensure <a href="https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/" data-wpel-link="internal">compliance</a> with regulations, reduced cyber risks, and greater consumer confidence in cybersecurity standards.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&amp;linkname=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&amp;linkname=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&amp;linkname=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&#038;title=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" data-a2a-url="https://zasio.com/information-management-cybersecurity-lessons/" data-a2a-title="Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/information-management-cybersecurity-lessons/" data-wpel-link="internal">Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/information-management-cybersecurity-lessons/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Navigating New U.S. Health Data Laws</title>
		<link>https://zasio.com/navigating-new-u-s-health-data-laws/</link>
					<comments>https://zasio.com/navigating-new-u-s-health-data-laws/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 15:26:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Laura Ames]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[HIPPA]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=7068</guid>

					<description><![CDATA[<p>Anxiety is growing over foreign access to U.S. health data. In response, regulators are stepping up efforts to protect this sensitive information. This post examines recent efforts to close gaps under HIPAA regarding the handling of electronic health information by foreign companies and abroad. Strengthening Traditional Protections Most readers are familiar with the Health Information Portability and Accountability Act (HIPAA), which provides federal protections to patient health information. HIPAA requires &#8216;covered entities&#8217; and their &#8216;business associates&#8217; to follow specific privacy and security rules for electronic patient health data. However, gaps can emerge when this data is sent outside the U.S. or transferred to foreign entities. As a result of these gaps, states have started to take steps to limit where health data can be stored. The U.S. Department of Justice has also recently enacted a rule restricting the transfer of personal health data and other forms of sensitive personal information to certain “countries of concern.” State Health Data Storage &#38; Transfer Restrictions In July 2024, Florida amended its Electronic Health Record Exchange Act to prohibit Florida health care providers and their third-party vendors from storing or transferring electronic health information outside the U.S. or Canada. With this amendment, Florida’s law is more stringent [&#8230;]</p>
<p>The post <a href="https://zasio.com/navigating-new-u-s-health-data-laws/" data-wpel-link="internal">Navigating New U.S. Health Data Laws</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Anxiety is growing over foreign access to U.S. <a href="https://zasio.com/?s=health+data&amp;et_pb_searchform_submit=et_search_proccess&amp;et_pb_include_posts=yes&amp;et_pb_include_pages=yes" data-wpel-link="internal">health data</a>. In response, regulators are stepping up efforts to protect this sensitive information. This post examines recent efforts to close gaps under HIPAA regarding the handling of electronic health information by foreign companies and abroad.</p>
<h4>Strengthening Traditional Protections</h4>
<p>Most readers are familiar with the Health Information Portability and Accountability Act (HIPAA), which provides federal protections to patient health information.</p>
<p>HIPAA requires &#8216;covered entities&#8217; and their &#8216;business associates&#8217; to follow specific privacy and security rules for electronic patient health data. However, gaps can emerge when this data is sent outside the U.S. or transferred to foreign entities. As a result of these gaps, states have started to take steps to limit where health data can be stored. The U.S. Department of Justice has also recently enacted a rule restricting the transfer of personal health data and other forms of sensitive personal information to certain “countries of concern.”</p>
<h4>State Health Data Storage &amp; Transfer Restrictions</h4>
<p>In July 2024, Florida amended its <a href="http://www.leg.state.fl.us/statutes/index.cfm?App_mode=Display_Statute&amp;URL=0400-0499/0408/Sections/0408.051.html" data-wpel-link="external" rel="external noopener noreferrer">Electronic Health Record Exchange Act</a> to prohibit Florida health care providers and their third-party vendors from storing or transferring electronic health information outside the U.S. or Canada. With this amendment, Florida’s law is more stringent than HIPAA with respect to patient data.</p>
<p>In Michigan, a similar piece of legislation is working its way through that state’s legislature. HB4242 requires state licensed health care providers to store medical records, whether physical or virtual, in the U.S. or Canada. The bill specifies that licensees must follow these requirements when they use a medical records company.</p>
<p>In addition, the federal government has also turned its attention to foreign interest in U.S. data, including “bulk” personal health data.</p>
<h4>Federal Restrictions on Data Transactions</h4>
<p>In December 2024, the Department of Justice issued a final <a href="https://www.justice.gov/nsd/media/1382521/dl?inline" data-wpel-link="external" rel="external noopener noreferrer">rule</a> (the “Bulk Data Rule”) restricting, and in some cases prohibiting, certain data transactions involving bulk U.S. sensitive personal data with six countries of concern: <strong>China, Cuba, Iran, North Korea, Russia, and Venezuela</strong>. The DOJ began enforcing the rule on July 8.</p>
<p>The Bulk Data Rule blocks these countries from accessing large amounts of personal health data. It also restricts access to biometric, genomic, geolocation, and financial information. It also applies to entities under the control, jurisdiction, ownership, or direction of the six countries of concern. The definition of “bulk” transactions varies between categories of data. For example, human genomic data on over 100 U.S. individuals is considered bulk; for personal health data, the number increases to 10,000.</p>
<p>The Bulk Data Rule includes multiple broad exceptions, making it complex. Nonetheless, the DOJ has been clear in its <a href="https://www.justice.gov/opa/pr/justice-department-implements-critical-national-security-program-protect-americans-sensitive" data-wpel-link="external" rel="external noopener noreferrer">instructions</a> to U.S. companies to understand the data they hold and how they use it. Accordingly, companies should carefully review their commercial, employment, and vendor agreements to ensure compliance.</p>
<h4>Why These New Restrictions Matter</h4>
<p>These new rules add to the existing patchwork of U.S. privacy laws. They cover all types of personal data, including health information. As a result, they can create new compliance challenges for companies handling health data in the United States, particularly those using third-party vendors or cloud services. Vendors should also examine new requirements to ensure they’re being followed.</p>
<p>Time will tell whether these new and proposed state and federal restrictions are the beginning of a wave of new regulatory efforts to control foreign access to U.S. health data. Either way, organizations should proactively investigate their <a href="https://zasio.com/" data-wpel-link="internal">records management solution</a> to ensure compliance with existing laws, as well as assess their capacity to respond to any future laws.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on <a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">information governance software</a>. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-new-u-s-health-data-laws%2F&amp;linkname=Navigating%20New%20U.S.%20Health%20Data%20Laws" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-new-u-s-health-data-laws%2F&amp;linkname=Navigating%20New%20U.S.%20Health%20Data%20Laws" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-new-u-s-health-data-laws%2F&amp;linkname=Navigating%20New%20U.S.%20Health%20Data%20Laws" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fnavigating-new-u-s-health-data-laws%2F&#038;title=Navigating%20New%20U.S.%20Health%20Data%20Laws" data-a2a-url="https://zasio.com/navigating-new-u-s-health-data-laws/" data-a2a-title="Navigating New U.S. Health Data Laws" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/navigating-new-u-s-health-data-laws/" data-wpel-link="internal">Navigating New U.S. Health Data Laws</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/navigating-new-u-s-health-data-laws/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Avoiding Health Data Retention Pitfalls: Learning from Recent FTC Actions</title>
		<link>https://zasio.com/health-data-retention-ftc-actions/</link>
					<comments>https://zasio.com/health-data-retention-ftc-actions/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 05 Aug 2024 18:30:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Laura Ames]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[retention]]></category>
		<category><![CDATA[Zasio]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=4883</guid>

					<description><![CDATA[<p>The Federal Trade Commission has recently adopted an aggressive approach to regulating mobile health app companies’ data security and retention policies. We can glean much useful information from the FTC’s enforcement actions to inform data security, privacy, and retention policies for health information and other types of data. The FTC’s Toolbox The FTC has two significant tools in its arsenal regarding data retention and security. The first is the 2009 Health Breach Notification Rule. This Rule seeks to cover the gaps left by HIPAA, which only regulates health plans, health care providers that conduct transactions electronically, and health care clearinghouses. In its 2024 update of the Rule, the FTC clarified its scope regarding both covered information and entities. The Rule requires vendors of personal health records (PHRs), related entities, and third-party service providers to notify customers, the FTC, and sometimes the media, when breaches occur. PHRs are records of an individual’s identifiable health information that can be drawn from multiple sources. The Rule only applies to information that is unsecured, meaning information that is neither encrypted nor destroyed. Companies covered by the Rule include health app producers but also companies that produce related accessories such as fitness trackers. Companies that [&#8230;]</p>
<p>The post <a href="https://zasio.com/health-data-retention-ftc-actions/" data-wpel-link="internal">Avoiding Health Data Retention Pitfalls: Learning from Recent FTC Actions</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Federal Trade Commission has recently adopted an aggressive approach to regulating mobile health app companies’ data security and retention policies. We can glean much useful information from the FTC’s enforcement actions to inform data security, privacy, and retention policies for health information and other types of data.</p>
<p><strong>The FTC’s Toolbox</strong></p>
<p>The FTC has two significant tools in its arsenal regarding data retention and security. The first is the 2009 Health Breach Notification Rule. This Rule seeks to cover the gaps left by HIPAA, which only regulates health plans, health care providers that conduct transactions electronically, and health care clearinghouses. In its 2024 update of the Rule, the FTC clarified its scope regarding both covered information and entities.</p>
<p>The Rule requires vendors of personal health records (PHRs), related entities, and third-party service providers to notify customers, the FTC, and sometimes the media, when breaches occur.</p>
<p>PHRs are records of an individual’s identifiable health information that can be drawn from multiple sources. The Rule only applies to information that is unsecured, meaning information that is neither encrypted nor destroyed. Companies covered by the Rule include health app producers but also companies that produce related accessories such as fitness trackers. Companies that provide services such as billing or data storage to PHR vendors also qualify.</p>
<p>In addition to the Rule, the FTC is guided by Section 5 of the Federal Trade Commission Act, which prohibits deceptive or unfair practices that affect commerce. As this language suggests, the FTC applies the Act quite broadly with respect to health data.</p>
<p><strong>Lessons from Recent FTC Actions and Guidance </strong></p>
<p>In business guidance published in 2023, the FTC emphasized how extensive the umbrella of health information truly is. The Commission confirmed any data conveying information or that even “enables an inference” about consumers’ health <a href="https://www.ftc.gov/business-guidance/blog/2023/07/protecting-privacy-health-information-bakers-dozen-takeaways-ftc-cases" data-wpel-link="external" rel="external noopener noreferrer">qualifies</a>. For example, a consumer’s mere use of a fertility or mental health app produces health information. In separate guidance, the FTC also highlighted that location data can provide insight beyond a person’s whereabouts like other sensitive information, such as health data. The FTC recommends companies “take a broad view of what constitutes health data and protect it accordingly” to <a href="https://www.ftc.gov/business-guidance/blog/2023/07/protecting-privacy-health-information-bakers-dozen-takeaways-ftc-cases" data-wpel-link="external" rel="external noopener noreferrer">avoid running into trouble</a>. The FTC further explained that security breaches do not refer only to malicious attacks but also to instances where companies share consumer data with other parties who have not been disclosed in their privacy notice.</p>
<p>Privacy policies were another major target for the FTC. In a complaint against the mental health app Cerebral, the FTC alleged that Cerebral used unfair or deceptive practices under Section 5 by sharing customer data with third parties like LinkedIn and TikTok. Cerebral’s privacy policy promised customer data would only be used internally, barring customer consent to do otherwise.</p>
<p>In a similar case, the FTC took action against online alcohol addiction treatment service Monument, Inc., alleging that the company disclosed users’ information after promising to keep it completely confidential. The FTC provided several takeaways from these cases. First, privacy and security representations in company policies are in fact product claims that must be substantiated. Secondly, the Rule applies to omissions, meaning that companies must disclose all material facts about their use of consumer data.</p>
<p><strong>Moving Forward</strong></p>
<p>Companies who collect or process data should be aware of the broad definitions of both covered entities and of what constitutes health data under the Health Breach Notification Rule. The Rule’s limitation to unsecured information also reinforces the importance of encrypting data diligently.</p>
<p>These days almost every company has a privacy policy, either by choice or by requirement. The FTC’s recent actions make it even clearer that privacy policies must be carefully crafted and specific about privacy and security procedures. Companies should review their policies to make sure that they don’t overpromise or under-include relevant activities related to collecting, processing, and sharing personal health records.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fhealth-data-retention-ftc-actions%2F&amp;linkname=Avoiding%20Health%20Data%20Retention%20Pitfalls%3A%20Learning%20from%20Recent%20FTC%20Actions" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fhealth-data-retention-ftc-actions%2F&amp;linkname=Avoiding%20Health%20Data%20Retention%20Pitfalls%3A%20Learning%20from%20Recent%20FTC%20Actions" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fhealth-data-retention-ftc-actions%2F&amp;linkname=Avoiding%20Health%20Data%20Retention%20Pitfalls%3A%20Learning%20from%20Recent%20FTC%20Actions" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fhealth-data-retention-ftc-actions%2F&#038;title=Avoiding%20Health%20Data%20Retention%20Pitfalls%3A%20Learning%20from%20Recent%20FTC%20Actions" data-a2a-url="https://zasio.com/health-data-retention-ftc-actions/" data-a2a-title="Avoiding Health Data Retention Pitfalls: Learning from Recent FTC Actions" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/health-data-retention-ftc-actions/" data-wpel-link="internal">Avoiding Health Data Retention Pitfalls: Learning from Recent FTC Actions</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/health-data-retention-ftc-actions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
