Some value identifying ‘known associates?’
https://www.bespacific.com/the-network-of-time/
The Network of Time
“The Network Of Time is an idea proposed on this website: the largest network of people who appear together in photos that currently exist which can be connected through peoples’ recurring appearances in different photos. This website, currently in a beta stage, represents the beginnings of a visualization of the Network. Match any two people on the front page and you will see how they have “met” through a series of (sometimes nonlinear in time) meetings or chance appearances, in the fewest number of photos possible based on our database. While the idea that all people have no more than six degrees of separation has been widely studied, this website is the first (public) project to visualize the effect exclusively through evidence of actual meetings in physical space and not other documentation of associations. If you have ever appeared in a photo with anyone who has appeared as an option on the lists on the front page of this site, or with anyone who has appeared in a photo with anyone as an option on these lists to X degrees – you are on the Network. (You probably still do not appear on the representation shown here, but you can submit photos to join!)”
Interesting to a former auditor and security manager…
https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
The United States Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients' data against potential cyber attacks.
… To that end, the proposal, among other things, requires organizations to conduct a review of the technology asset inventory and network map, identify potential vulnerabilities that could pose a threat to electronic information systems, and establish procedures to restore the loss of certain relevant electronic information systems and data within 72 hours.
Other notable clauses include carrying out a compliance audit at least once every 12 months, mandating encryption of ePHI at rest and in transit, enforcing the use of multi-factor authentication, deploying anti-malware protection and removing extraneous software from relevant electronic information systems.
No comments:
Post a Comment