Page 1,763«..1020..1,7621,7631,7641,765..1,7701,780..»

How to prevent a data breach: 10 best practices and tactics – TechTarget

It's not difficult to convince business leaders that a data breach can cause tremendous pain. Lost proprietary knowledge, reputational damage and remediation expenses can add up to disastrous, if not catastrophic, fallout.

Ponemon Institute's 2021 "Cost of a Data Breach" report, sponsored by IBM, estimated a single breach costs $4.24 million on average. From a business continuity standpoint, however, the true impact is often far higher.

In short, the risks associated with a data breach are nearly incalculable. Not every organization can survive the financial, legal and reputational ramifications of a significant breach.

Business and IT leaders are, therefore, seeking ways to stop these attacks from occurring in the first place.

Because data breaches occur for many reasons, it is critical to use multiple technologies and processes to mitigate them. Below are 10 key best practices for preventing data breaches.

Editor's note: While incident response policies, tools and practices should also be part of an enterprise's overall security posture, the following tips focus on data breach prevention.

To protect its data, a business must first understand what and where it is -- necessitating a thorough inventory of all data sets and sensitive information locations. This inventory should be subject to regular updates and reviews to keep pace with the addition, removal and movement of data.

Even when done with the best intentions, granting privileged access to employees and contractors can get out of hand in a hurry and put data at unnecessary risk. Establish and enforce policies surrounding elevated levels of access, with regular oversight. Privileged access management tools can help facilitate and enforce these policies.

It's not difficult to convince business leaders that a data breach can cause tremendous pain.

The patching of networks and systems should be a top priority for any IT security team. The number of newly discovered zero-day exploits continues to rise, and attackers commonly take advantage of unpatched software to gain access to critical data.

Traditionally, the first line of defense against external threats is network perimeter security. This includes the use of firewalls, intrusion prevention and intrusion detection systems, access control lists and other tools designed to allow unfettered business data flows internally, while helping identify and stop known threat attempts coming from outside the organization.

The implementation of endpoint security controls, such as malware detection software, has never been more important. Users and workloads have become highly distributed and often fall outside the protection of traditional perimeter security tools. With proper implementation and management, endpoint security can deliver exceptional safeguarding against common internet-based threats, such as web-based malware.

If nefarious actors can successfully penetrate an organization's perimeter security, their next logical step in the intrusion process is to figure out what other systems they can access and potentially infiltrate. Thwart their efforts, and limit unsanctioned lateral movement with microsegmentation, which creates isolated network zones.

No matter where sensitive data is at any given moment, it should be encrypted to prevent anyone capable of accessing the data from reading it. Not only does this include encrypting data where it resides, but also when it is moving from one point to another within a corporate network.

Modern password policies should be an absolute requirement for all applications and services running on an enterprise network. Examples of password requirements and restrictions are the following:

Advanced network monitoring and threat detection tools help detect and block intrusions and prevent data breaches from occurring or spreading. Behavior-based tools that use AI, such as network detection and response platforms, detect user, network and data flow anomalies that might indicate a breach is underway. These tools alert the appropriate IT security staff, who can then conduct further investigation and mitigation.

No cybersecurity strategy is complete without ample security awareness training for all who access and interact with sensitive corporate data. It should come as no surprise that intentional and unintentional mistakes of staff, contractors and partners represent the biggest threat to data security and the most significant challenge in data breach prevention. Proper training that covers data usage guidelines, password policies and common threats, such as social engineering and phishing scams, should happen regularly.

It's important to note that, while data breach prevention should be a top concern, organizations must balance it against other, sometimes competing, priorities. Each enterprise must, therefore, find the right, tailored mixture of cybersecurity policies and tools to align with its organizational risk appetite, minimizing the likelihood of a security incident, while maximizing business productivity -- only then will the organization have a data breach prevention strategy that delivers proper levels of protection, speed and agility.

View original post here:
How to prevent a data breach: 10 best practices and tactics - TechTarget

Read More..

Security and defence dialogue between the UK and Ghana – GOV.UK

Serious and organised crime

The United Kingdom and Ghana commit to further strengthen the collaboration between our governments and law enforcement agencies to counter the threat that serious and organised crime and organised criminal gangs pose to both countries by addressing the drivers and enablers of criminality and disrupting their business models.

The United Kingdom and Ghana commit to further deepen collaboration to disrupt the SOC criminals and networks which impose highest harm, and to reduce vulnerabilities of individuals, businesses and communities to exploitation from SOC criminals and networks, including through the delivery of new UK programming aimed at tackling illicit financial flows including the management and return of criminal assets and cybercrime.

Given the prioritisation of transnational Organised Crime in Ghanas national security strategy, the United Kingdom commits to providing support to Ghana to develop its strategic framework, including through the implementation of the new asset recovery and management policy framework and narcotics master plan.

In order to increase disruptions of the trafficking of drugs, the UK will continue to support relevant Ghanaian law enforcement agencies, including NACOC. Ghana will further enhance agencies ability to operate by ensuring full access to WCO CTS and ICUMS and allowing for joint inspection rights at Tema Port.

The United Kingdom and Ghana reaffirm our shared commitment to achieving progress on shared illicit financial flow outcomes to cement Ghanas removal from the FATF grey list.

The UK commits to exploring how GoAML can be integrated more effectively across the Ghanaian law enforcement system. The United Kingdom and Ghana recognise the challenges presented by unregulated and illegal gold-mining, and the United Kingdom will start a new programme of support to build community resilience against the SOC and stability related risks presented by this.

The United Kingdom and Ghana recognise that although our countries face different border challenges, there is much to be learned from each other. We commit to maintaining our law enforcement collaboration to protect our borders and strive to mitigate the corrupt practices which undermine them.

The United Kingdom and Ghana affirm our cooperation on shared commitment to the effective management of migration and travel between our two countries. The UK will continue to work closely with Ghana immigration service including skills towards data analysis to improve border security. UK agrees to work closely with GIS on immigration matters particularly on deportation to allow GIS to prepare adequately to reintegrate Ghanaian deportees.

The United Kingdom and Ghana recognise the increasing proximity of instability to Ghanas borders and the risk this presents to Ghana particularly in the northern zone and West Africa. The United Kingdom and Ghana acknowledge the importance of civilian-led security and civil-military cooperation in maintaining stability in border areas and giving a platform for development.

The United Kingdom and Ghana agree to work together in support of Ghanas efforts to institutionalise integrated economic and human development, good governance, peacebuilding and civil-military cooperation within Ghanas planning and response, in support of Ghanas national security strategy, with a closer working relationship between the Ministry of National Security and relevant UK staff.

The United Kingdom and Ghana will increase cooperation in the areas of community policing, community conflict resolution, and support to the coordination of economic development efforts through the Northern Development Authority. The UK will continue to support large and broad ranging development assistance programmes, and will work with international partners to increase engagement with the softer interventions and human security approaches set out in the national security strategy.

The UK agrees to support Ghanas counter-terrorism initiatives by providing avenues to ensure that vulnerable communities become resilient to conflict and the causes of violent extremism.

The United Kingdom and Ghana reaffirm our commitment to work together to respond to the shared threat of violent extremism and terrorism. In support of this commitment the United Kingdom will share experience of delivering a multi-agency approach in response to terrorist incidents, including to work with Ghana to identify vulnerabilities in strategic sites and sharing best practice.

The United Kingdom will share experience on preventing radicalisation and violent extremism and taking intelligence led and evidence-based approaches. The United Kingdom will support Ghana in preventing terrorist use of the internet, and working to mitigate the risks of prisons being used for radicalisation.

The United Kingdom will share insight on terrorist financing, trans-border movements and the illegal movement of small arms and light weapons.

The UK will continue to support aviation security at Kotoka International Airport and will explore how to support increased protection of maritime architecture.

The United Kingdom and Ghana recognise the importance and opportunity to engage on cyber. The United Kingdom and Ghana commit to agreeing the scope of a cyber work programme, grounded in capability needs assessment and eco-system analysis of relevant Ghanaian bodies.

The United Kingdom will support Ghana to raise levels of cyber awareness for citizens and institutions, with a focus on areas of greatest harm to mutual interests and explore potential collaboration for developing SME toolkits. The UK and Ghana will work together to build capacity in specific agreed areas.

The United Kingdom and Ghana reaffirm the longstanding and deep relationship between our armed forces, and commit to expanding existing defence cooperation and partnership for mutually agreed critical areas.

The United Kingdom and Ghana share concern at the increase of violent incidents, attacks and insurgency in West Africa. The United Kingdom will support efforts to achieve regional solutions to these threats, recognising that instability does not recognise borders.

The United Kingdom will support Ghana to galvanise international support for regional initiatives such as the Accra Initiative, and ensure that support for such initiatives is coordinated and coherent. Ghana will work with other countries under the Accra Initiative to ensure that UK support is aligned appropriately.

The United Kingdom and Ghana commit to integrating the commitment made through this dialogue into workplans, reviewed through a working group structure meeting quarterly, and to agree future cooperation at the next security dialogue, which we will aim to hold in summer 2023. This dialogue will involve all relevant ministries, departments and agencies from both governments.

View post:
Security and defence dialogue between the UK and Ghana - GOV.UK

Read More..

[Webinar] Data Mining in Incident Response: Managing Risk and Spend through An Effective Evidence-Based Approach – August 31st, 12:00 pm – 1:00 pm ET…

Data mining has increasingly become one of the largest expenses during a cyber incident, often leaving claims professionals with blown budgets and insured clients in high-risk scenarios when assumptions about their data (and what may lurk within) dictate the operationalized response towards providing notice to affected parties after a breach.

A lack of standards amongst breach coaches, claims professionals, and the vendors who consult on and perform data mining work has resulted in an unmanageable situation for insurers, despite there being repeatable, defensible methods to stage, understand, and act on sensitive data utilizing workflows that are established in the scientific method and eDiscovery in general during litigation.

This session will highlight the risks of over and under notice of effective individuals in a cyber incident and will discuss key checkpoints ahead of and throughout the data mining process, while will giving claims professionals a new understanding of the types of levers they should be pulling internally at their organizations, and with their partners to optimize, manage, and establish repeatable processes with a special focus on the below underlying themes:

* Whether to provide individual notice under data breach law requires understanding some key facts: whose data is at issue? Where are they (in what jurisdiction)? What data is at issue? How (and to what degree) was the data compromised.

* When unstructured data is compromised, this requires identifying the who, where and what of the data through cyber review. Making assumptions about the data (even informed assumptions based on SMEs) will inevitably lead to over and under inclusive notice. PII and PHI can creep into places (and be missing from others).

* Over notice creates risk as it inflates the scope of the breach unnecessarily damaging the brand and making the incident more attractive for litigation.

* Under notice is worse as it can lead to questions about the sufficiency and completeness of the notice and remediation steps. Attacking the completeness of the notice allows plaintiff counsel to open a new front in their litigation.

Expert Panelists

Mike SarloChief Innovation Officer, President, Global Investigations and Cyber Incident Response Services, HaystackID

Mike, as Chief Innovation Officer, works closely with HaystackIDs software development and data science teams to deliver best-in-class data collection, eDiscovery, and review solutions that allow legal teams to act on data types typically not conducive to collection, review, or production in the context of eDiscovery. In his role as President of Global Investigations, Michael works closely with clients on the most challenging and complex regulatory, investigative, and civil litigation matters. Michael also oversees HaystackIDs Cyber Discovery and Incident Response Services division. He leads a cross-functional team of HaystackID experts that regularly assist insurers, breach coaches, and their corporate clients when a data breach occurs.

Susana MedeirosAssociate, Norton Rose Fulbright

Susana is an associate and a member of the Information Governance, Privacy, and Cybersecurity team. She is a Chambers-ranked attorney recognized and has represented clients both preparing for and responding to cyber incidents. Leveraging her traditional eDiscovery experience, Susana assists clients with efficiently and defensibly responding to cyber incidents to quickly identify data subjects impacted and the types of personal information impacted, and advise clients about the scope of the incident and the companys obligations to notify the appropriate authorities and the people affected by breach. She also assists with providing advice around CCPA, CPRA, and GDPR compliance from an information governance and data minimization perspective.

Kelly AthertonSenior Manager of Cyber Incident Response, Norton Rose Fulbright

Kelly is the Senior Manager of Cyber Incident Response at Norton Rose Fulbright. She leads a team of eDiscovery professionals to support the cyber review component of the firms global data breach and cyber incident response services. She has prior experience practicing complex business litigation and has held director roles with legal services providers specializing in TAR, analytics, and managed review. She is CEDS certified; a Relativity Expert; a Brainspace Certified Analyst, Specialist, and Administrator; and holds certifications in Reveal AI and Review.

Anya KorolyovVice President, Cyber Incident Response and Custom Solutions, HaystackID

Anya, the Vice President of Cyber Incident Response and Custom Solutions at HaystackID, has 17 years of experience in the legal industry as a licensed attorney, including 14 years of experience in eDiscovery, focusing on data mining, complex integrated workflows, and document review. In her role, Anya works on developing and implementing the strategic direction of Cyber Incident Response. Anya is one of the industrys leading experts on Data Breach Incident Response, Notification, and Reporting, with a solid understanding of machine learning, custom object development, regular expressions manipulation, and other technical specialties.

See more here:

[Webinar] Data Mining in Incident Response: Managing Risk and Spend through An Effective Evidence-Based Approach - August 31st, 12:00 pm - 1:00 pm ET...

Read More..

Edge Data Solutions Introduces the ‘Crypto Arctic Tank 194’ at 2022 Mining Disrupt Conference in Miami Beach – Business Wire

MIAMI BEACH, Fla.--(BUSINESS WIRE)--Edge Data Solutions Inc. (OTC: EDGS), an edge data center, crypto mining and cloud infrastructure provider, is joining its partner Raptor Power Systems in introducing the new EDGE Crypto Arctic Tank 194, a first-of-a-kind 194kw sustainable, immersion mining solution, at the 2022 Mining Disrupt Conference in Miami Beach. The Crypto Arctic Tank 194 provides users up to 50% more hashing capacity with the highest-density power-distribution unit and the highest-efficiency fluid on the market, EDGE FLUID VHP 1200. Raptor has chosen EDGE as its exclusive immersion partner for crypto mining and enterprise data center solutions.

Demos of EDGEs Crypto Arctic Tank will be provided at 2 p.m. at exhibition booth No. 56 at the conference, which takes place at the Miami Airport Convention Center, 711 NW 72nd Ave, Miami, Fla., 33126.

Additionally, at the event, EDGE President and Co-Founder Daniel Wong provided a keynote presentation yesterday, titled: Immersion Cooling: The Future of Sustainable Mining. Following this, at 4:15 p.m. Thursday, Wong will participate in a panel discussion titled High on Hash.

EDGEs Crypto Arctic Tank is a first-of-a-kind turnkey solution to a sustainability mining problem. It helps future-proof crypto operations by providing miners with the scalable, sustainable system they need to accommodate future business growth. Its versatility to operate in a complete spectrum of environments and to integrate seamlessly with existing equipment enables operators to deploy this technology anywhere around the world, from container units to industrial buildings.

EDGE is proud to fulfill its mission as cleantech leaders, said Delray Wannemacher, Edge CEO and Co-Founder. EDGEs Crypto Arctic Tank is the industrys first efficient liquid immersion solution, which future-proofs crypto operations by enabling miners to minimize energy consumption and operational costs while maximizing profitability. We are proud that EDGEs multi-disciplinary team, together with its partners at Raptor Power Systems, is bringing together the best minds from all generations to provide the industry with the highest level of enterprise standards.

Added EDGE President Wong: The disruption of the financial sector with blockchain technology is continuing to push the envelope of computing cooling technology to optimize the hash capacity without sacrificing machine life. EDGEs first-of-a-kind solutions provide the best overclock performance free of hash rate peaks, while giving the blockchain community a unique opportunity to lead the world in next-generation cooling technology. EDGE looks forward to continuing to pave new paths for the industry in sustainable mining and cleantech.

Some background on the issues: In todays energy crisis, crypto mining is frowned upon for its high energy consumption and its negative impacts on the global carbon footprint. Air-cooled Bitcoin mining is the basic, traditional method of managing the heating and cooling of mining rigs with fans and air. On the other hand, immersion-cooled Bitcoin mining more efficiently uses circulation pumps and special liquids designed to work with electronics instead of air. It enables miners to reduce their energy consumption and operational costs by removing the heat generated by the hashboards which are used to anonymously pass crypto transaction information.

Specifically, the Crypto Arctic Tank is differentiated from other solutions on the market today because it:

EDGEs proprietary Edge Performance Platform enables it to deploy next-generation edge data centers from any location, providing the industrys most advanced immersion cooling technology that improves performance and reduces energy costs and latency. The company is noted for its next-generation technology that serves more computing power for a variety of high-performance computing applications, such as crypto mining, public and private cloud providers, data centers, high-performance computing providers, virtual desktop infrastructure providers, telecom, cybersecurity and disaster recovery providers, streaming providers, artificial intelligence innovators, colleges, hospitals, governments, and enterprise blockchain.

Beyond EDGEs leadership in crypto mining, the company also is transforming the global infrastructure of technology, enabling chip manufacturers and technology companies to develop solutions that rely on high-density computer power.

About EDGE Data Solutions Inc.

EDGE Data Solutions Inc. (OTC: EDGS), Edge is an industry-leading edge data center, crypto mining and cloud infrastructure provider. Edges proprietary Edge Performance Platform enables it to deploy next-generation edge data centers where they are needed most. Its data centers provide sustainable immersion cooling technology that maximizes performance and reduces energy costs and latency. The company is distinguished for its next-generation technology that serves more computing power for a variety of high-performance computing applications, such as crypto mining, public and private cloud providers, data centers, high-performance computing providers, virtual desktop infrastructure providers, telecom, cybersecurity and disaster recovery providers, streaming providers, artificial intelligence innovators, colleges, hospitals, governments, and enterprise blockchain.

More information is available at https://edgedatasolutions.io/.

About Raptor Power Systems

Raptor Power Systems is a manufacturer of power distribution units (PDUs), breaker panels and other key electrical components for crypto farms, data centers, industrial automation, military applications and more. Raptor has installed over two million outlets for crypto farms and data centers over the last four years. Raptor products are designed, manufactured, and supported in the USA. https://raptorpowersystems.com/

Editors Notes: Interviews and images are available upon request. Media demos will be provided at Booth No. 56 during the conference upon request.

Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. These statements relate to future events or our future financial performance and involve known and unknown risks, uncertainties and other factors that may cause our or our industrys actual results, levels of activity, performance or achievements to be materially different from any future results, levels of activity, performance or achievements expressed, implied or inferred by these forward-looking statements, including those risks and uncertainties described in our filings with the U.S. Securities and Exchange Commission, including our most recent reports on Forms 10-K, 10-Q and 8-K, and any amendments thereto. Therefore, current and prospective security holders are cautioned that there also can be no assurance that the forward-looking statements included in this press release will prove to be accurate. In light of the significant uncertainties inherent in the forward-looking statements included herein, the inclusion of such information should not be regarded as a representation or warranty by Edge Data Solutions or any other person that the objectives and plans of Edge Data Solutions will be achieved in any specified time frame, if at all. In some cases, you can identify forward-looking statements by terminology such as may, will, should, could, would, expects, plans, intends, anticipates, believes, estimates, predicts, projects, potential, or continue or the negative of such terms and other comparable terminology. These statements are only predictions based on our current expectations and projections about future events. You should not place undue reliance on these statements. Actual events or results may differ materially. In evaluating these statements, you should specifically consider various factors. These and other factors may cause our actual results to differ materially from any forward-looking statement. We undertake no obligation to update any of the forward-looking statements after the date of this press release to conform those statements to reflect the occurrence of unanticipated events, except as required by applicable law.

The rest is here:

Edge Data Solutions Introduces the 'Crypto Arctic Tank 194' at 2022 Mining Disrupt Conference in Miami Beach - Business Wire

Read More..

Texas lawyers prepare for a wave of abortion criminalization – The Texas Tribune

Sign up for The Brief, our daily newsletter that keeps readers up to speed on the most essential Texas news.

A young woman and her mother are nervously driving through the night when theyre pulled over by law enforcement. Flashlights in their faces, the women are questioned about whether theyre heading for the border and whether the young woman might be pregnant, before being pulled out of the car.

This political ad, released ahead of the 2020 election, speculated about what a post-Roe v. Wade future might look like as Republican states sought to crack down on abortion ban violators.

In the weeks since the U.S. Supreme Court overturned the constitutional protection for abortion, the ad went viral, contributing to growing fears of state border checkpoints and widespread data mining to track menstruation and pregnancy outcomes.

But I think the reality is, the vast majority of these criminal cases are going to begin in kind of more mundane and common ways, said Emma Roth, staff attorney at National Advocates for Pregnant Women.

Despite fears of unconstitutional legal gambits and Big Brother-style tracking, lawyers and experts predict that much of what is expected to unfold over the coming months and years will look very familiar.

More than 1,700 people have faced criminal charges over pregnancy outcomes since 1973, according to NAPW. Like a woman charged with murder for a self-induced abortion in Starr County earlier this year, many pregnant people who get caught up in the criminal justice system are reported to law enforcement by health care workers. Like a woman in Mississippi who was charged with murder after a stillbirth, many people willingly turn over digital records that are used to incriminate them.

Reproductive justice lawyers say they are focused not on preparing for a potential dystopian future like the one presented in the commercial, but on educating health care providers, lawyers and pregnant people about what they can do to protect themselves right now with the rights they still have available to them.

In January, a 26-year-old woman in rural South Texas went to Starr County Memorial Hospital for complications related to a self-managed abortion.

A nurse at the hospital reported her to law enforcement, and in April, the woman was charged with murder and imprisoned on a $500,000 bond. The district attorney later dismissed the charges, acknowledging that Texas law specifically exempts someone who has an abortion from being prosecuted for murder.

Despite the legal missteps, this case tread a very familiar path for pregnancy criminalization.

The most common way that a criminal case begins is that they are reported by a medical provider, Roth said.

Getting an illegal abortion looks very different in 2022 than it did in 1972: Many people who would have turned to surgical abortions can now have pills discreetly mailed to their homes. There are international nonprofits that have publicly flouted state and federal regulations for years to provide these medications to people in states that restrict abortion access.

The two-drug regimen is generally safe and effective, when taken as recommended, but there is always a risk of medical complications.

Advocates worry that people who self-manage an abortion or experience a miscarriage that resembles an abortion may not seek out necessary medical assistance if they fear being prosecuted.

Although Texas abortion law specifically exempts pregnant patients, the Starr County case exemplifies the ways they can still get caught up in the system.

We know that prosecutors are going to try to criminally punish people, irrespective of what the law says, said Farah Diaz-Tello, senior counsel at If/When/How, a reproductive justice legal nonprofit, in an interview last month. For us to be able to resist this criminalization, it is important to note that it is unlawful criminalization. Merely being an act of a prosecutor doesnt mean that its the law.

Pregnant people may also worry about anyone who, in the language of the law, aided and abetted or helped furnish the means for an abortion friends who drove them over state lines, someone who mailed them pills, a doctor who provided an ultrasound to ensure they completed the abortion.

People are living in constant fear [because] they wouldnt want to do anything that would jeopardize the liberty of their loved ones or their medical providers, and as a result, may avoid necessary health care, Roth said.

Prosecutors in five Texas counties have vowed that they will not pursue abortion-related charges, but legislators are already discussing ways they may empower other district attorneys to bring charges outside their jurisdiction.

And Texas abortion laws do not bring only criminal penalties. The trigger law, which goes into effect later this summer to coincide with the overturning of Roe v. Wade, also has civil penalties of at least $100,000 per abortion, and under a law commonly referred to as Senate Bill 8, anyone who aids or abets in a prohibited abortion can be sued for up to $10,000 by any private citizen.

Anti-abortion lawyers have already begun filing pre-lawsuit petitions to depose abortion providers and abortion funders to gain information about potential prohibited abortions, in hopes of bringing lawsuits.

Already, advocacy groups have mobilized resources for people who face prosecution or fear it. If/When/How operates a legal help line that answers questions and helps connect people to legal resources around abortion access. NAPW provides pro bono legal representation to people who are facing criminalization over a pregnancy outcome with the slogan, If you are locked up because you are knocked up call NAPW!

Advocates and lawyers are working to arm health care providers and pregnant patients with information about their rights.

Since Texas current abortion laws do not require providers to report someone they suspect may have undergone an illegal abortion, providers who do proactively report to law enforcement may be in violation of the Health Insurance Portability and Accountability Act.

In the wake of the Supreme Court ruling in Dobbs v. Jackson Womens Health Organization, the U.S. Department of Health and Human Services issued guidance clarifying providers obligation under HIPAA, stressing the importance of giving individuals confidence that their protected health information including information relating to abortion and other sexual and reproductive health care, will be kept private.

The guidance makes clear that providers cannot disclose to law enforcement that a patient is considering seeking an illegal or out-of-state abortion, or provide data on all abortions performed at a facility without a court order.

Roth said this is an important message right now, as many health care providers may be inclined to over-report for fear of being criminalized themselves.

They are very concerned about the liability of not reporting, Roth said. I hope that this guidance clarifies that they should also be concerned about being found in violation of federal law if they report when they should not have done so.

But HIPAA does not offer blanket protection to people navigating the health care system.

Law enforcement could also use a court order, a court-ordered warrant, subpoenas and administrative requests to compel a health care provider to release a patients medical records in the case of a suspected illegal abortion, said Rebecca Reingold, associate director of the ONeill Institute for National and Global Health Law. A health care provider could refuse to comply but would likely face fines or penalties for doing so.

HIPAA also applies only to covered entities, like health care providers and insurers. Other health care services, including health tracking apps, are not protected by HIPAA and can potentially leave a trail of breadcrumbs that could help law enforcement identify illegal abortions.

Theres a lot of different ways that we are leaving recorded footprints, both where we go online, but then the real kicker is, where we go in the real world with your location tracking, said Jen King, privacy and data policy fellow at the Stanford Institute for Human-Centered Artificial Intelligence.

This digital footprint trails behind each of us, documenting where we go, what we search, who we text and call, and with services like period tracking apps, when we menstruate or dont menstruate.

Law enforcement can access all of that through warrants or even, depending on who theyre asking, sometimes providers will just hand that information over, King said.

This has led many people to delete their period tracking apps, and Democratic U.S. Sens. Elizabeth Warren and Ron Wyden have introduced a pair of bills that would limit the sale of health and location data collected from smartphones.

But many digital security advocates are pushing back against the idea that the average person using an app to track their period is going to get caught up in a digital dragnet, at least at this point.

Period trackers are not the primary form of digital evidence likely to be used in abortion prosecutions today, said Kendra Albert, a lawyer with the Cyberlaw Clinic at Harvard Law School, in a Medium post. If tracking your period is useful to you, you dont need to stop tracking your period, although you may choose to switch to an app that collects less data and stores it locally.

Most often, the trail of information becomes relevant once law enforcement is already investigating a suspected illegal abortion that was reported by friends, family or medical professionals.

In 2017, Latice Fisher delivered a stillborn baby at her home in Mississippi; she was 35 weeks pregnant. Fisher originally told health care professionals that she didnt know she was pregnant.

But when Fisher voluntarily handed her phone over to the police, they found she had googled how to buy abortion-inducing medication 10 days before she gave birth. She was charged with second-degree murder, though there was no concrete evidence that she took the medication.

After Fisher spent several weeks in jail, the district attorney put the case to a second grand jury, which declined to indict her.

Whats really important about that case is that the police didnt need to seek a warrant because she actually willingly handed over her phone, Roth said. Never, ever hand your phone over to law enforcement if they dont have a warrant, and also dont talk to law enforcement without your attorney present.

If someone is actively seeking out an abortion, lawyers and digital security experts recommend taking precautions using a secure browser and relying on encrypted texting services or burner phones for communication, as a starting point.

But for people fearful of potentially needing an abortion in the future, King said, its difficult to fully cover your tracks all the time.

Those are all fingers in the leaking dam, King said. You can try to plug them all, but then youll basically be living like somebody who practices operational security for a living. Thats hard. I dont even do all that.

When you join us at The Texas Tribune Festival Sept. 22-24 in downtown Austin, youll hear from changemakers who are driving innovation, lawmakers who are taking charge with new policies, industry leaders who are pushing Texas forward and so many others. See the growing speaker list and buy tickets.

Link:

Texas lawyers prepare for a wave of abortion criminalization - The Texas Tribune

Read More..

Pharmacovigilance study of the association between dipeptidyl peptidase4 inhibitors and angioedema using the FDA Adverse Event Reporting System…

Vasoactive peptide-induced angioedema may occur not only in ACEIs but also in DPP-4Is. This study evaluated the association between DPP-4Is and angioedema, including cases with and without the concomitant use of ACEIs. When we stratified the data according to age group and sex, we detected a signal for the female subset, three female age groups with patients aged60s, and the group of males in their 40s. ON excluding ACEI users from the whole dataset, we only detected a signal for females in their 60s and males aged80years. Individually, signals for saxagliptin and sitagliptin, which were detected when the whole dataset was analyzed, disappeared when we excluded ACEI users. Notably, linagliptin was the only DPP-4I where a signal was detected in females regardless of age and concomitant ACEI use.

From the stratified analysis in our study, the number of detected signals for DPP-4Iassociated angioedema was more in the female groups than in the male groups (Fig.1, Table 2) and more in the elderly groups than in the middle-adulthood groups (Fig.1, Table 2). Generally, the incidence of drug-induced angioedema has been reported as higher in females25, 26, and older age has been associated with a higher incidence of angioedema27, which supports our results.

A previous study using pharmacovigilance databases also reported the association between DPP-4I and angioedema28, 29. Lepelley et al. evaluated the association of an increased angioedema reporting risk using the World Health Organizations pharmacovigilance database, reporting that exposure to DPP-4I alone was not associated with a disproportionality signal for angioedema28. Moreover, in another study using the Japanese Adverse Drug Event Report database, the authors also performed a disproportionality analysis to evaluate DPP-4I/ACEI-induced angioedema and concluded that DPP-4I tended to have different effects on the onset of angioedema from ACEI in clinical practice, because an inverse association of DPP-4I with angioedema was found. The difference in the conclusion could be attributed to the use of different pharmacovigilance databases, which include information on different races. Additionally, although the adverse event (angioedema) was defined according to MedDRA in both cases, there was a slight difference in the selection of PTs. Moreover, our study classified the data in more detail by stratification according to age and sex.

Some case reports have suggested that linagliptin can cause acute renal failure with hypotension and hyperkalemia when added to the treatment regimens of patients already receiving ACEIs30, 31. Moreover, a recent in silico and in vivo study reported that many DPP-4Is, including linagliptin, could potentially inhibit ACE in concentrations close to those required for DPP-4 inhibition32. These results suggest that linagliptin can inhibit two enzymes, both of which contribute to BK and SP degradation, and it may be reasonable to assume that linagliptin causes angioedema.

Conversely, it was also reported that sitagliptin inhibits both DPP-4 and ACE32, despite the detection of a limited signal for sitagliptin in our study (Tables 2 and 3). A possible explanation may be the different pharmacokinetics of these drugs. In other words, since the more complete or sustained ACE inhibition seen with the longer-acting agents may be detrimental33, DPP-4Is are suggested to inhibit ACEs for a longer-acting duration and also be more likely to cause angioedema than shorter-acting agents. The half-life of linagliptin and sitagliptin is 104113h34 and 914h35, respectively. Further studies are necessary to determine whether such inhibitory effects occur in clinical settings.

It has been proposed that patients with a history of ACEI-induced angioedema are at risk for recurrent angioedema with DPP-4Is36. This may be explained by reports that the enzymatic activity of DPP-4 is innately reduced in the sera of such patients compared with the sera of ACEI-treated patients without angioedema37,38,39. Furthermore, the concentrations of enzymes involved in BK and SP degradation were reported to have drastically reduced compared with the reference range for at least a year after inhibition by DPP-4Is and ACEIs37, 40. Therefore, the recurrence of angioedema in patients with such a history warrants additional care, given the possible inhibition of BK and SP degradation, even without DPP-4Is and ACEIs administration.

This study suggests that the use of DPP-4Is, even in the absence of concomitant ACEI use, is associated with angioedema in clinical practice. To determine whether this is a class effect of DPP-4I, further studies are essential. In any case, clinicians should be aware of the possible association as seen in this study.

Although the analysis of a spontaneous report is a valuable method for identifying signals, there are potential limitations of such databases that may have affected the interpretation of our findings. First, adverse events are not always induced by medication. Second, angioedema is influenced by many confounding factors, such as comorbidities including chronic heart failure or coronary artery disease4, 5; the concomitant administration of drugs other than ACEIs, such as angiotensin receptor blockers, antibiotics, and nonsteroidal anti-inflammatory drugs41; and smoking5, 6, which we did not take into consideration in this study. Although the incidence of angioedema has been reported to be lower in patients with diabetes mellitus4, 6, we had to include such patients because DPP-4Is are used to treat diabetes mellitus in clinical practice. Third, as mentioned above, duplicate reports for the same case could be included in spontaneous reporting systems, and, conversely, underreporting may occur. Fourth, data are missing and drug names are frequently misspelled in the FAERS database. Additionally, concerning data mining techniques, given that control populations are not included in spontaneous reporting systems, disproportionality-based signals indicate an increased risk of adverse event reporting, not the risk of the adverse events.

Go here to see the original:

Pharmacovigilance study of the association between dipeptidyl peptidase4 inhibitors and angioedema using the FDA Adverse Event Reporting System...

Read More..

Putin’s Nightmare Has Arrived: Sanctions Creating Economic Oblivion For Russia – 19FortyFive

Academic Claims Sanctions Have Decimated the Russian Economy According to a paper written by Yale Universitys Jeffrey Sonnenfeld and 18 co-authors, Western sanctions placed on Russia in the wake of the invasion of Ukraine are working as intended and severely damaging the Russian economy.

The paper, titled Business Retreats and Sanctions Are Crippling the Russian Economy, is the product of research performed by Yale University academics who used private Russian language and unconventional data sources which included high-frequency consumer data, cross-channel checks, and releases from Russias trade partners.

The authors also claim to have used data mining of complex shipping data to create one of the first comprehensive economic analyses measuring Russian current economic activity some five months after the invasion began.

The authors state that, as a result of Western economic sanctions on Russian financial institutions and businesses, the countrys strategic positioning as a commodities exporter has irrevocably deteriorated. Russia now deals from a position of weakness and still faces challenges as it adopts a pivot to Asia approach designed to rely less on trade with the West.

Despite some workarounds and leakiness in international sanctions, the papers authors say that Russian imports have mostly collapsed and Russia now faces major challenges in obtaining technological parts, with widespread supply shortages already hurting its domestic economy.

Self-Sufficiency Delusion

The authors also describe Putins promise of becoming more self-sufficient as a nation as delusional, showing how Russian domestic manufacturing has come to a total standstill with no ability to replace lost businesses, talent, and products. To top it off, the analysis reveals that Russias economy is now struggling with soaring prices and consumer angst.

Russias claims that oil and gas revenues are being used to withstand the effect of the economic sanctions were also shown as lies by the papers authors, and the paper also painted a negative picture of Russias future unless something changes.

Looking ahead, there is no path out of economic oblivion for Russia as long as the allied countries remain unified in maintaining and increasing sanctions pressure against Russia, and The Kyiv School of Economics and McFaul-Yermak Working Group have led the way in proposing additional sanctions measures, the paper states, adding that defeatist headlines in the Western press about Russias economy bouncing back are not factual.

The Kremlin, however, has repeatedly painted a very different picture. In June, Russian President Vladimir Putin said that his nations economy would overcome the reckless and insane sanctions levied by Western states. Putin told the St. Petersburg International Economic Forum that efforts to hurt the Russian economy didnt work and that Russian government authorities and businesses have worked in a composed and professional manner to normalize the economic situation.

We stabilized the financial markets, the banking system, the trade system, he claimed.

Jack Buckby is a British author, counter-extremism researcher, and journalist based in New York. Reporting on the U.K., Europe, and the U.S., he works to analyze and understand left-wing and right-wing radicalization, and reports on Western governments approaches to the pressing issues of today. His books and research papers explore these themes and propose pragmatic solutions to our increasingly polarized society.

Read more here:

Putin's Nightmare Has Arrived: Sanctions Creating Economic Oblivion For Russia - 19FortyFive

Read More..

EcoVadis targets ‘millions’ in supply chain to drive ESG impact | Greenbiz – GreenBiz

Its been a busy month for Pierre-Francois Thaler. Not only did EcoVadis, the sustainability ratings company he co-founded and acts as co-CEO with business partner Frdric Trinel, receive a half-billion dollars in funding, but the company then acquired German sustainability data mining company ecotrek.

"We started 15 years ago. For many years we saw a slow tick up in adoptions," Thaler said. "Today, we are seeing mass adoption. In the past 12 months there has been a cascading effect, with Fortune 500 companies escalating the momentum, all working to drive improvement and scale in their sustainability impact."

EcoVadis offers a collaborative platform that companies use to assess and rank environmental, societal and governance (ESG) activities and programs, then build strategies and plans to improve scores. Since 2007, EcoVadis ratings have become widely used by environmentally conscious organizations and investors. The Paris-based company reports that about 750 multinational enterprises, representing more than 47,000 procurement and sustainability professionals, use the platform internally and to assess and monitor a global supplier base or selected business partners. To date, the EcoVadis database counts more than 90,000 rated companies in 175 countries and 200 industries.

Pierre-Franois Thaler and Frdric Trinel, co-founders and co-CEOs of EcoVadis

For anyone questioning the clout that EcoVadis carries, 1,000 of its largest customers represent $3 trillion in annual procurement spend in the supply chain.

EcoVadis methodology uses seven management indicators across 21 sustainable criteria in four themes: environment; labor and human risks; ethics; and sustainable procurement. EcoVadis follows international sustainability standards such as the Ten Principles of the United Nations Global Compact, the International Labor Organization conventions and the U.N. Guiding Principles on Business and Human Rights.

In June, EcoVadis raised $500 million to become one of the ESG ratings sector's first "unicorns" an unlisted firm valued at $1 billion or more. Private equity firms Astorg and BeyondNetZero led the funding, along with General Atlantic's climate investing arm, as well as Singapore's GIC and Princeville Capital. The infusion brings the total capital raised by the company to more than $725 million. In July, EcoVadis took the next step with the ecotrek acquisition; it plans to use ecotreks automated sustainability data collection, scanning and analysis capabilities to complement the EcoVadis portfolio.

EcoVadis ratings work in multiple ways. First, companies get ratings for their own ESG activities and performance. Enterprise organizations upstream in the supply chain use that information to improve internal processes and procedures, build on ESG strategy and broadcast the rating to investors as well as to customers. Many of these large companies are trying to serve as a model for their suppliers; larger companies can use the platform to assess and track companies in their chain. Small to midsize suppliers also use EcoVadis to assess and improve operations, while reporting to partners upstream and to investors and the market. All companies using EcoVadis pay a subscription fee that varies based on size and whether they request internal ratings only or are tracking companies in their supply chain.

John Wagner, founder of sustainability consultancy Paladin Pathway LLC, said EcoVadis is closing a gap surrounding inconsistent data gathering in the ESG market.

"Each company had its own questions and format. Now a company can report into EcoVadis, receive reports and ratings in a consistent format, and then share that information with suppliers and customers," Wagner said. "EcoVadis provides the feet on the street to chase down those answers and report in a comparable manner across all categories."

According to Thaler, EcoVadis initially launched with a vision to address the acute business need for reporting efficiency. Over time, the companys raison detre has evolved.

"The vision at the outset was to build a cloud platform and the technology to solve the efficiency problem. The whole system was not efficient," Thaler explained. As the company grew and as environmental problems got bigger, the vision changed. "We feel the role and responsibility. Our customers are a big part of the solution. This will be more impactful than what regulators or countries can do."

Thaler said the toughest aspect of gathering ESG data is finding the right combination between scale and impact. "Some actions can drive change but are not scalable. Other actions, like filling out endless forms, are scalable but have no impact."

Real impact will come when as many companies as possible are participating, Thaler said.

"In the Fortune 2000 supply chain, there are approximately 2 million companies. We want to be able to go in depth and very broad, and cover the millions of companies in that supply chain."

Key large enterprise customers include the likes of pharmaceutical giant Johnson & Johnson, heavy equipment manufacturer Deere and Company, British multinational consumer goods company Unilever, and automobile manufacturers Volvo and General Motors.

While these companies have all pledged to improve ESG practices and ratings, GM has asked its suppliers to sign an ESG Supplier Pledge to join in a commitment to carbon neutrality. "We took an internal journey last year to look at the landscape of rating platforms for suppliers. We found [EcoVadis] to be a great solution for GM," said Fred Gersdorff, senior manager of socially responsible and sustainable supply chains for the automaker.

Similarly, John Deere has instituted Leap Ambitions, focused goals designed to boost economic value and sustainability for Deere and all of its stakeholders, including its suppliers.

We want to be able to go in depth and very broad, and cover the millions of companies in that supply chain.

"Embedding sustainability deeply in the Deere business so that it is the focus in how we make decisions," is the goal, explained Kimberly Noe, program manager of Sustainability. "To manage both the economic and environmental and social impacts of our decisions, just not pure economics."

Noe said that sustainability gains will only happen when larger corporations incorporate as much of their networks of smaller companies.

"At Deere, we are taking a holistic view of our supply chain, and asking the companies we work with the important ESG questions: Are you taking care of the environment and considering the environment in your decisions? Are you considering your employees? Do you have controls in place and are you doing what you say you're doing? Its far more than just are you going to be on time with delivery."

EcoVadis also has partnered with a group of technology companies, such as Microsoft, SAP and supplier intelligence platform TealBook, all of which have embedded the EcoVadis platform into their offerings. TealBook provides procurement, financial and supply chain data for companies looking to find and partner with other ESG-minded companies.

"One of the reasons that EcoVadis dominates the market is the freshness of the data and getting the right information on the supplier. This helps with clear decision-making that makes an impact," said Matt Palackdharry, chief strategy and revenue officer for TealBook. This capability is especially important with disruptions like the pandemic or geopolitical wars changing supplier data on a daily basis, he said.

EcoVadis offers educational and informational products available to all levels of its customers and partners. EcoVadis IQ provides sustainability risk insights across an entire supply chain. The tool can provide recommendations on next steps and proactive sustainability risk management for a better assessment strategy. EcoVadis Academy is an elearning module with 16 courses covering introductory and more detailed courses in multiple languages designed to educate small- and medium-sized businesses. And to address the issue that only about 15 percent of suppliers globally report on emissions, EcoVadis offers the Carbon Action Module, which provides a carbon-specific ratings scorecard.

Editors note: This story includes information contributed by GreenBiz Editorial Director Heather Clancy.

See the original post here:

EcoVadis targets 'millions' in supply chain to drive ESG impact | Greenbiz - GreenBiz

Read More..

Prices of Ethereums original coin soar as crypto miners flock to ETC ahead of looming Merge – Fortune

Over the past two weeks Ethereums popular ETH coin jumped by nearly half as confidence builds over its hotly anticipated switch, or Merge, to a leaner, more efficient blockchain technology called proof of stake.

Yet its gains pale in comparison to the sudden surge of interest in another, long-forgotten alternative from the very beginning of Ethereums history.

The value of ETC, a kind of illegitimate offspring birthed in 2016, has tripled during the same period and nearly taken out highs last visited in March, according to data from CoinGecko.

Its price surge really began to take off after Vitalik Buterin, Ethereums founder, encouraged users and developerslast weekto migrate back to his original creation if they were not convinced by theupcoming Merge.

Its a very welcoming community, Buterin told the Paris conference. If you like proof of work, you should go use Ethereum Classic, its a totally fine chain.

ETC resulted from the so-called DAO Hack of the Ethereum network in which $60 million was successfully stolen from a decentralized autonomous organization just a year after Buterins creation had first gone live in July 2015at the time a fortune for a fledgling crypto industry.

A vote was held by DAO users responsible for governance decisions, with a majority supporting a hard fork in the chain that would restore investors their stolen money.

Since the decision was highly controversial, another part of the community refused to play along and instead continued with the original chain, known as Ethereum Classic, and its native currency, ETC.

Buterins comments have helped rekindle interest in the ETC cryptocurrency from miners, most of whom have not had it easy with the recent collapse in ETH and now face effectively losing their income entirely.

The reason is that Ethereum, the second most popular blockchain after Bitcoin, will no longer require mining services once it switches to a faster, more efficient technology as part of the Mergetentatively scheduled for Sept. 19.

Replacing them will instead be stakers, who will assume their job maintaining the security of its trustless payment network.

Confronted with the imminent loss of business, mining pool AntPool pledged to invest $10 million on Tuesday to support further development of Ethereum Classic, which is now run independently.

To understand the difference between miners and stakers, its important to first understand the underlying technology.

Normally financial transactions require a trusted counterparty like a bank to ensure both sides of an exchange can fulfill their end of the deal before it clears the trade and credits or debits an account.

Cryptocurrency changes hands on an entirely permissionless basis, however. Complete strangers can buy and sell coins using anonymous wallets without fear of being shortchanged.

Thats because an asset like Bitcoin operates using a shared ledger of transactions distributed to everyone interested in maintaining the network.Business is recorded in the form of blocks on a chain with miners paid newly minted Bitcoin as an incentive to validate each of these immutable entries.

This majority consensus mechanism is known as proof of work (PoW), and it requires an enormous amount of computing power for each miner to keep his or her copy of the ledger always up to date and current.

Because Bitcoins network prioritized security and decentralization above all, it requires enough electricity to power a small country and can only process transactions at a snails pace by todays standards.

Thats why new types of blockchain technology have emerged such as Solana that take a completely opposite approach, using what is known as proof of stake (PoS) to improve energy efficiency and scalability to achieve speeds similar to credit card giant Visa.

Instead of transactions being validated by whoever is willing to set aside their computing power as a mining rig, people stake a certain amount of their own holdings much as they would a security deposit.

The downside to this solution is that more influence is centralized in the hands of a smaller, select number of people who stand to benefit from being the only ones that can reap blockchain rewards by maintaining the network.

There are penalties to ensure the system is not abused, however. In the event of an attack, either staged with intent or permitted through negligence, their staked crypto can be forfeited in part or whole.

Ethereum is now in the process of switching from PoW to its so-called Beacon chain currently running in parallel that uses PoS. Validators that want to earn crypto must agree to first lock up 32 ETH, roughly $55,000 at present value.

For those miners either not willing or able to do so, they can switch to Ethereum Classic.

Theyll definitely welcome proof-of-work fans, Buterin said.

Sign up for theFortune Features email list so you dont miss our biggest features, exclusive interviews, and investigations.

Continue reading here:

Prices of Ethereums original coin soar as crypto miners flock to ETC ahead of looming Merge - Fortune

Read More..

The Center for Health Affairs Brings Innovative Nurse Retention Solution to Hospitals – PR Newswire

Working with Pegasus Knowledge Solutions, Inc., The Center for Health Affairs is connecting hospitals with an advanced tool designed to strengthen and support nurse retention.

CLEVELAND, July 28, 2022 /PRNewswire/ -- The Center for Health Affairs, the leading advocate for Northeast Ohio hospitals, today announces a new partnership with Pegasus Knowledge Solutions, Inc. (PKSI) to bring an innovative tool to hospitals aimed at helping them retain nurses, a critical element of their workforce.

PKSI is a leading provider of advanced analytic software, including their innovative Advanced Workforce Analytics (AWA) solution that delivers critical insights to reduce nurse turnover. AWA is an out-of-the-box solution, enabling hospitals to simply connect their data to the platform to begin using it. The solution incorporates pre-built human resources data models, machine learning analytics, and visualizations based on open-source technology, and is designed to help hospitals:

"Workforce particularly attracting and retaining nurses is a critical area of concern for hospitals across the country, including here in Northeast Ohio," saidBrian Lane, president & CEO, The Center for Health Affairs. "We are working to bring tools and solutions to hospitals to help them with this area of need. PKSI's innovative solution can help hospitals and health systems with their workforce retention efforts, which is a key component of every staffing strategy."

PKSI's nurse retention tool is the latest addition to The Center's portfolio ofworkforce solutions, which also include itsCareer Center, aimed at helping healthcare employers in Northeast Ohio recruit new employees, and its education resources, which are designed to help organizations retain and develop their workforce.

"Data and AI are transforminghealthcare delivery and services.This initiative will equip providers with AI and data-driven techniques to understand and addressthe challenges that frontline workers face and thereby improve employee experience and reduce turnover," said Supreet Singh, executive vice president, Pegasus Knowledge Solutions. "This solution will combineour workforce analyticsexpertisewith The Center for Health Affairs' deep understanding of the needs of its provider members."

To learn more about PKSI's AWA solution and how it can help with nursing workforce retention,contact us.

About Pegasus Knowledge Solutions, Inc.

Founded in 1997,Pegasus Knowledge Solutions, Inc.(PKSI) is an independent, advanced analytic software and services organization that partners with industry leading providers to help customers create value from their data, bringing a range of talents, including data integration and preparation, big data environments, data mining, predictive analytics, machine learning and text mining, as well as dashboarding and visualization. PKSI is focused on quality, speed of execution, value and above all, customer satisfaction. Our global solution delivery centers are ISO 9001-2008 and ISMS 27001-2013 Certified.

About The Center for Health Affairs

The Center for Health Affairs, the nation's first regional hospital association, has served as the collective voice of Northeast Ohio hospitals for more than 100 years. Together with its business affiliates, CHAMPS Group Purchasing and The Essentials Group, The Center continues the legacy of its founders, working collaboratively to increase the efficiency of healthcare delivery, providing insightful healthcare information to the public and undertaking initiatives aimed at improving the health of the community. For more information, visit http://www.neohospitals.org.

Press Contact

Michele Fancher216.255.3657https://www.neohospitals.org

SOURCE The Center for Health Affairs

Read the original here:

The Center for Health Affairs Brings Innovative Nurse Retention Solution to Hospitals - PR Newswire

Read More..