In June 2020, the Secretary-General of the United Nations published a "Roadmap for Digtal Cooperation." In this report, he expanded on recommendations made a year before, calling on all actors, including the Member States, the United Nations system, the private sector, and others, to promote digital public goods. He says to realize the benefits of increased internet connectivity, open source projects in the form of digital public goods must be at the center. While the term "digital public good" appears as early as April 2017, this report offers the first broadly accepted definition of digital public goods...The Digital Public Goods Alliance (DGPA) translated that definition into a nine-indicator open standard that we hope will serve as a comprehensive, shared definition to promote the discovery, development, use of, and investment in digital public goods for a more equitable world.
Personally Identifiable Information (PII)
See the following -
4 Big Data Threats Health Org’s Are Socially Obligated To Safeguard Against
The explosion of big data continues as it brings to picture a wealth of information possessed by the healthcare industry including credit card information, personal security details, medical procedures, diagnosis codes, insurance claims and more. Read More »
- Login to post comments
5 Tips For Cybersecurity Incident Response
Experts and politicians agree that security and privacy incidents are a given...And as the new cyber-risk handbook from the National Association of Corporate Directors puts it: “If a sophisticated attacker targets a company’s systems, they will almost certainly [be breached].”...
- Login to post comments
A Deeper Look at the Financial Impact of Cyber Attacks
As large-scale instances of data theft — including theft of credit card records and personally identifiable information (PII) — are becoming more frequent, corporate executives and financial leaders are giving greater attention to the “cost” of cyber breaches. Are they looking at the breach, which typically categorizes data theft, or are they addressing “cost” as it relates to the entirety of the impact of a cyber incident to the enterprise?
- Login to post comments
CISPA Is Back: FAQ On What It Is And Why It's Still Dangerous
The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. Read More »
- Login to post comments
Going Mobile: How Mobile Technology is Evolving in Clinical Trials
...[M]obile communication has been leveraged to provide information and access to services across multiple industries, from simple applications such as checking train timetables to mobile banking with secure access to personal information in a highly regulated industry. Clinical research is no exception to this trend and indeed the pharmaceutical industry has seen an increasing movement to leverage mobile technology to engage with patients and collect their data during clinical trials...
- Login to post comments
Setting A Standard For Digital Public Goods
The Spooky Side of Healthcare Cybercrime and Steps to Protect Your Data
Although we all applaud the massive push towards electronic health records (EHRs) and the digitization of medical information, there are some very tangible cybercrime data breach threats that exist which could topple the momentum gained by the launch of the Health Information Technology for Economic and Clinical Health Act (HITECH) two and half years ago. Two recently released reports (Verizon’s Data Breach Investigations Report and FireEye’s Advanced Threat Report) suggest that the proportion of healthcare data breaches is rising fast, the largest majority targeting patient personal and payment information (including patient health and insurance data) that attackers can directly or indirectly use to make a profit...
- Login to post comments
Vampire Data And 3 Other Cyber Security Threats For 2013
Kroll Advisory Solutions has released its 2013 Cyber Security Forecast, spotlighting some of the pressing and perhaps unexpected privacy and security issues healthcare and other organizations may be grappling with in the coming year. Read More »
- Login to post comments
Why Healthcare Data Security, Compliance Issues Go Untreated
Secure managed file transfer solutions can be beneficial to covered entities as they work to overcome healthcare data security and compliance issues. If there ever was a pulse of healthcare operations, it’s data. From patient enrollment forms, electronic health records, and health insurance information, the amount of electronic data flowing through the medical community increases every day. With that, healthcare data security must also be a top priority...
- Login to post comments