Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information
Author: Erika McCallister
Publisher: DIANE Publishing
Total Pages: 59
Release: 2010-09
Genre: Computers
ISBN: 1437934889

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

Beyond the HIPAA Privacy Rule

Beyond the HIPAA Privacy Rule
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 334
Release: 2009-03-24
Genre: Computers
ISBN: 0309124999

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.

Protecting Data Privacy in Health Services Research

Protecting Data Privacy in Health Services Research
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 208
Release: 2001-01-13
Genre: Computers
ISBN: 0309071879

The need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that we need to support informed choices depends on access to data, but at the same time, individual privacy and patient-health care provider confidentiality must be protected.

Innovations in Federal Statistics

Innovations in Federal Statistics
Author: National Academies of Sciences, Engineering, and Medicine
Publisher: National Academies Press
Total Pages: 151
Release: 2017-04-21
Genre: Social Science
ISBN: 030945428X

Federal government statistics provide critical information to the country and serve a key role in a democracy. For decades, sample surveys with instruments carefully designed for particular data needs have been one of the primary methods for collecting data for federal statistics. However, the costs of conducting such surveys have been increasing while response rates have been declining, and many surveys are not able to fulfill growing demands for more timely information and for more detailed information at state and local levels. Innovations in Federal Statistics examines the opportunities and risks of using government administrative and private sector data sources to foster a paradigm shift in federal statistical programs that would combine diverse data sources in a secure manner to enhance federal statistics. This first publication of a two-part series discusses the challenges faced by the federal statistical system and the foundational elements needed for a new paradigm.

Why Privacy Matters

Why Privacy Matters
Author: Neil Richards
Publisher:
Total Pages: 0
Release: 2021
Genre: Civil rights
ISBN:

This is a book about what privacy is and why it matters. Governments and companies keep telling us that Privacy is Dead, but they are wrong. Privacy is about more than just whether our information is collected. It's about human and social power in our digital society. And in that society, that's pretty much everything we do, from GPS mapping to texting to voting to treating disease. We need to realize that privacy is up for grabs, and we need to craft rules to protect our hard-won, but fragile human values like identity, freedom, consumer protection, and trust.

Information at Work

Information at Work
Author: Katriina Byström
Publisher: Facet Publishing
Total Pages: 200
Release: 2019-03-26
Genre: Business & Economics
ISBN: 1783302755

Today’s society is characterized by quick technological developments and constant changes to our information environments. One of the biggest changes has been on our workplace environments where technological developments have automated work processes that were previously done by manual labour whilst new professions and work tasks have emerged in response to new methods of creating, sharing and using information. Information at Work: Information management in the workplace provides a comprehensive account of information in the modern workplace. It includes a set of chapters examining and reviewing the major concepts within workplace information, from over-arching themes of information cultures and ecologies, to strategic concerns of information management and governance, and to detailed accounts of questions and current debates. This book will be useful reading for researchers in Information Science and Information Management and students on related courses. It is also suitable to be used as an introductory text for those working in allied fields such as Management and Business Studies.

Overview of the Privacy Act of 1974

Overview of the Privacy Act of 1974
Author: United States. Department of Justice. Privacy and Civil Liberties Office
Publisher:
Total Pages: 276
Release: 2010
Genre: Government publications
ISBN:

The "Overview of the Privacy Act of 1974," prepared by the Department of Justice's Office of Privacy and Civil Liberties (OPCL), is a discussion of the Privacy Act's disclosure prohibition, its access and amendment provisions, and its agency recordkeeping requirements. Tracking the provisions of the Act itself, the Overview provides reference to, and legal analysis of, court decisions interpreting the Act's provisions.

The Legal Protection of Trade Secrets

The Legal Protection of Trade Secrets
Author: Allison Coleman
Publisher:
Total Pages: 149
Release: 1992
Genre: Confidential communications
ISBN: 9780421471702

The Legal Protection of Trade Secrets places trade secrets firmly in the context of intellectual property rights and commerce, and considers the complex web of law and policy underlying any decision to protect confidential information from unauthorized disclosure. It considers the position from both the situation of the employer and the employee.

Engaging Privacy and Information Technology in a Digital Age

Engaging Privacy and Information Technology in a Digital Age
Author: National Research Council
Publisher: National Academies Press
Total Pages: 450
Release: 2007-06-28
Genre: Computers
ISBN: 0309134005

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.

Gurry on Breach of Confidence

Gurry on Breach of Confidence
Author: Tanya Aplin
Publisher: OUP Oxford
Total Pages: 1634
Release: 2012-03-29
Genre: Law
ISBN: 0191640395

Francis Gurry's renowned work, Breach of Confidence, published in 1984, was groundbreaking and invaluable in the field of intellectual property as the first text to synthesise the then burgeoning case law on breach of confidence into a systematic form. A highly regarded book, it was the first point of resort for practitioners and a key source for judges. Aplin, Bently, Johnson and Malynicz bring us a new edition of this important work, which remains faithful to the original in its approach, but is fully updated in light of the developments since the first edition. The authors expand upon the original work, in particular adding new material on the history and current relevance of the action for breach of confidence, . The authors stress both the advantages and disadvantages of the action for breach of confidence and, like Gurry, they constantly distinguish the action from associated legislative regimes which regulate the access to, acquisition, use and disclosure of information. The book extensively references the many analyses of the data protection regime and considers also issues of jurisdiction and choice of applicable law. Bringing together their particular skills and interests, the three authors produce a fresh re-writing of a highly significant text which retains the academic quality and precision of the original and stakes its claim once more as the leading authority in the field.