TITLE

Privacy 3.0: Leave Me Alone Goes Away

AUTHOR(S)
Zalud, Bill
PUB. DATE
December 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the definition of Privacy 3.0 which focuses on the proportionality between information processing and data sensitivity. According to Andrew Serwin, a partner with Foley and Lardner LLP, government and private citizens do not benefit from overbroad privacy restrictions. It highlights the study conducted by Dr. Larry Ponemon which revealed that the healthcare industry is struggling to protect sensitive medical information.
ACCESSION #
56438033

 

Related Articles

  • Overcast but Clearing as the Cloud Comes to Security. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jan2012, Vol. 49 Issue 1, p32 

    The article focuses on the potential for a global cloud computing traffic to grow 12-fold by 2015. It notes how information technology and the growing enterprise security leaders see and regard business advantages in sharing software, processing, and storage. Andrew Serwin, chair of the privacy,...

  • Computer hackers step up attacks on health care records.  // Healthcare Risk Management;Jun2008 HIPAA, p1 

    The article reports on the research conducted by SecureWorks Inc. which states that there is an increase of attempted health care computer hacking due to increase in client-side attacks, flaw computer security, and large volume of medical records retained by health care organizations.

  • Assessing the other 'R' in RHIOs: Risk and liability of electronic privacy implications. Lieneck, Cristiana // MGMA Connexion;Sep2013, Vol. 13 Issue 8, p42 

    The article provides information on the risk of the availability and exchange of health information for medical group practices. The new capability of medical providers in exchanging information on one patient resolves the failed omission if the protected health information (PHI) is accessible...

  • Attitudes regarding privacy of genomic information in personalized cancer therapy. Rogith, Deevakar; Yusuf, Rafeek A.; Hovick, Shelley R.; Peterson, Susan K.; Burton-Chase, Allison M.; Yisheng Li; Meric-Bernstam, Funda; Bernstam, Elmer V. // Journal of the American Medical Informatics Association;Oct2014, Vol. 21 Issue e2, pe320 

    Objective To evaluate attitudes regarding privacy of genomic data in a sample of patients with breast cancer. Methods Female patients with breast cancer (n=100) completed a questionnaire assessing attitudes regarding concerns about privacy of genomic data. Results Most patients (83%) indicated...

  • Security Slump. Ecker, Keith // InsideCounsel;Nov2006, Vol. 16 Issue 180, p15 

    The article discusses results of a survey by Foley & Lardner on the failure of companies to boost data security despite the potential for costly litigation over privacy issues. It is said that a significant number of companies have yet to encrypt sensitive information about customers or...

  • Reducing patient re-identification risk for laboratory results within research datasets. Atreya, Ravi V.; Smith, Joshua C.; McCoy, Allison B.; Malin, Bradley; Miller, Randolph A. // Journal of the American Medical Informatics Association;Jan2013, Vol. 20 Issue 1, p95 

    Objective To try to lower patient re-identification risks for biomedical research databases containing laboratory test results while also minimizing changes in clinical data interpretation. Materials and methods In our threat model, an attacker obtains 5-7 laboratory results from one patient and...

  • BIOMETRICS IN HEALTH CARE SECURITY SYSTEM, IRIS-FACE FUSION SYSTEM. Al-Hijaili, Shoa'a JadAllah; AbdulAziz, Manal // International Journal of Academic Research;Jan2011, Vol. 3 Issue 1, p11 

    Background objectives: Security is considered a corner stone for health-care information systems as they contain extremely sensitive information. The aim is to provide healthcare personnel access to the right information at the right time while ensuring high patient privacy. Biometrics play an...

  • Making Privacy Work. Ponemon, Larry // CIO Insight;Sep2004, Issue 43, p44 

    This article presents comments by information privacy guru Larry Ponemon regarding eight critical steps to raise the level of awareness of privacy issues, which he has presented to select gatherings of top information executives. These include: understanding information risks and prioritizing...

  • Health Care IT: Securing Health Care Information: 10 Ways to Defend Against Data Breaches. Horowitz, Brian T. // eWeek;8/14/2012, p5 

    The article focuses on ways the prevent data breaches in the health care industry. Judy Hanover, research director at IDC Health Insights offers some ways health care information technology (IT) needs to invest in data security including by increasing data audits, securing mobile devices, and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics