PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Limiting Risk When Sharing PHI

Posted on December 5, 2015June 26, 2025 by Dissent

From Privacy Analytics:

Six Strategies for Privacy Officers to Protect their Organization and Limit Risk when Sharing PHI

Privacy Officers have a huge challenge in front of them. Demand to share data is growing. Demand to protect patient privacy is paramount. How can they balance the need for information and the risk? Sharing data for secondary use is inherently a risk management exercise.

[…]

Effectively safeguarding patient privacy while maintaining the quality of the data is achieved through two broad measures: — applying proper encryption and security controls and applying a risk-based de-identification methodology to keep the granularity of the data.

[…]

Our recent white paper, What’s the Risk, delves into the six ways that Privacy Officers can limit risk when releasing data for secondary uses. …. Download your copy today.

No related posts.

Category: BreachesHealthcare

Post navigation

← Does U.S. Children’s Privacy Law Apply to Google?
Russia passes law to overrule European human rights court →

Now more than ever

Search

Contact Me

Email: info@pogowasright.org

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

RSS Recent Posts on DataBreaches.net

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
©2025 PogoWasRight.org. All rights reserved.
Menu
  • About
  • Privacy