Diamond, Mark
May 2009
Infonomics (1942-5910);May/Jun2009, Vol. 23 Issue 3, p44
Trade Publication
The article offers ways for companies to protect private information from the unauthorized access of employees. It highlights the growth of technological advances like the Internet and mobile computing, which make it easier for employees to migrate sensitive information. It points out the need to train employees about the sensitivity and risks of the company's information, with discussion on proper email usage and the importance of separating business from personal communication.


Related Articles

  • Design and development of a web-based application for diabetes patient data management. Deo, S. S.; Deobagkar, D. N.; Deobagkar, Deepti D. // Informatics in Primary Care;Mar2005, Vol. 13 Issue 1, p35 

    A web-based database management system developed for collecting, managing and analysing information of diabetes patients is described here. It is a searchable, client-server, relational database application, developed on the Windows TM platform using Oracle, Active Server Pages (ASP), Visual...

  • Critical Success Factors for Cybersecurity Leaders. Klimoski, Richard // People & Strategy;Winter2016, Vol. 39 Issue 1, p14 

    The article offers information on the role and responsibilities of a chief information security officer (CISO) in managing threats on cybersecurity and information security. Topics include the collaboration of CISO and chief information officer (CIO) to administer information technology (IT)...

  • Design of Functions and Framework of Enterprise Human Resource Management Information System. Zhang Weimei // Information Technology Journal;2013, Vol. 12 Issue 8, p1593 

    To acquire competitive advantages, a large number of enterprises construct Management Information System (MIS) by application of advanced information technology. Human resource management is the foundation for the enterprise to obtain talents and improve the competitive force and, is more the...

  • Exploding volumes of patient data to create demand for storage devices in healthcare.  // ATM/ Gigabit;Jul2012, Vol. 23 Issue 7, p15 

    The article presents an analysis of a research conducted by research firm Frost & Sullivan Ltd. on the European data storage market that is driven by technology developments and a growing need to document patient data for future interpretation. The research unveils the impact of the continued...

  • IT'S place in tough times. Edwards, Douglas J. // Behavioral Healthcare;Jan2009, Vol. 29 Issue 1, p17 

    The article focuses on the information technology (IT) plans of the behavioral healthcare industry in the U.S. The county-supported electronic medical record (EMR) system has been adopted by Henrietta Weill Memorial Child Guidance Clinic in Kern Country in California because they cannot afford...

  • Simple steps to data integrity. Klancer, Patricia // Materials Management in Health Care;Jun2007, Vol. 16 Issue 6, p29 

    The article offers steps on how to create, maintain, and sustain data integrity throughout the health care environment. These include establishing an access to the materials management information system (MMIS), creating internal processes and standards, and developing a directory of standard...

  • SAVING CLINICIANS PRECIOUS TIME. Goedert, Joseph // Health Data Management;Aug2007, Vol. 15 Issue 8, p36 

    The article discusses the use of Eisenhower Memorial Hospital of a single-sign-on system to improve clinicians' access to electronic health records. The system, known as FastPass, uses a technology from Sentillion Corp. that allows clinicians to customize screens so they could easily access the...

  • Outsourcing Information Security: Contracting Issues and Security Implications. Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan // Management Science;Mar2014, Vol. 60 Issue 3, p638 

    A unique challenge in information security outsourcing is that neither the outsourcing firm nor the managed security service provider (MSSP) perfectly observes the outcome, the occurrence of a security breach, of prevention effort. Detection of security breaches often requires specialized...

  • Merging Information Systems For Risk and Benefits Managers. Tweedy, David A. // Risk Management (00355593);Nov90, Vol. 37 Issue 11, p64 

    This article discusses several aspects of merging risk management and employee benefits information systems. Both disciplines, employers and employees will benefit from the creation of an employee benefits and risk management information system (ERIS). In the last decade, as of 1990, advanced...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics