Personally Identifiable Information (PII)

See the following -

4 Big Data Threats Health Org’s Are Socially Obligated To Safeguard Against

Carl Ascenzo | Government Health IT | September 20, 2012

The explosion of big data continues as it brings to picture a wealth of information possessed by the healthcare industry including credit card information, personal security details, medical procedures, diagnosis codes, insurance claims and more. Read More »

5 Tips For Cybersecurity Incident Response

Rick Kam | Government Health IT | February 2, 2015

Experts and politicians agree that security and privacy incidents are a given...And as the new cyber-risk handbook from the National Association of Corporate Directors puts it: “If a sophisticated attacker targets a company’s systems, they will almost certainly [be breached].”...

Read More »

A Deeper Look at the Financial Impact of Cyber Attacks

Emily Mossburg | Financial Executives International Daily | December 15, 2015

As large-scale instances of data theft — including theft of credit card records and personally identifiable information (PII) — are becoming more frequent, corporate executives and financial leaders are giving greater attention to the “cost” of cyber breaches. Are they looking at the breach, which typically categorizes data theft, or are they addressing “cost” as it relates to the entirety of the impact of a cyber incident to the enterprise?

Read More »

CISPA Is Back: FAQ On What It Is And Why It's Still Dangerous

Mark M. Jaycox and Kurt Opsahl | Electronic Frontier Foundation | February 25, 2013

The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. Read More »

Going Mobile: How Mobile Technology is Evolving in Clinical Trials

Tim Davis | Applied Clinical Trials | May 12, 2014

...[M]obile communication has been leveraged to provide information and access to services across multiple industries, from simple applications such as checking train timetables to mobile banking with secure access to personal information in a highly regulated industry. Clinical research is no exception to this trend and indeed the pharmaceutical industry has seen an increasing movement to leverage mobile technology to engage with patients and collect their data during clinical trials...

Read More »

Setting A Standard For Digital Public Goods

In June 2020, the Secretary-General of the United Nations published a "Roadmap for Digtal Cooperation." In this report, he expanded on recommendations made a year before, calling on all actors, including the Member States, the United Nations system, the private sector, and others, to promote digital public goods. He says to realize the benefits of increased internet connectivity, open source projects in the form of digital public goods must be at the center. While the term "digital public good" appears as early as April 2017, this report offers the first broadly accepted definition of digital public goods...The Digital Public Goods Alliance (DGPA) translated that definition into a nine-indicator open standard that we hope will serve as a comprehensive, shared definition to promote the discovery, development, use of, and investment in digital public goods for a more equitable world.

The Spooky Side of Healthcare Cybercrime and Steps to Protect Your Data

John Trader | Healthcare IT News | October 31, 2012

Although we all applaud the massive push towards electronic health records (EHRs) and the digitization of medical information, there are some very tangible cybercrime data breach threats that exist which could topple the momentum gained by the launch of the Health Information Technology for Economic and Clinical Health Act (HITECH) two and half years ago. Two recently released reports (Verizon’s Data Breach Investigations Report and FireEye’s Advanced Threat Report) suggest that the proportion of healthcare data breaches is rising fast, the largest majority targeting patient personal and payment information (including patient health and insurance data) that attackers can directly or indirectly use to make a profit...

Read More »

Vampire Data And 3 Other Cyber Security Threats For 2013

Mike Miliard | Government Health IT | December 31, 2012

Kroll Advisory Solutions has released its 2013 Cyber Security Forecast, spotlighting some of the pressing and perhaps unexpected privacy and security issues healthcare and other organizations may be grappling with in the coming year. Read More »

Why Healthcare Data Security, Compliance Issues Go Untreated

Dave Brunswick | Health IT Security | August 9, 2016

Secure managed file transfer solutions can be beneficial to covered entities as they work to overcome healthcare data security and compliance issues. If there ever was a pulse of healthcare operations, it’s data. From patient enrollment forms, electronic health records, and health insurance information, the amount of electronic data flowing through the medical community increases every day. With that, healthcare data security must also be a top priority...

Read More »