IT-Zeitschriften, Fachbücher, eBooks, digitale Magazine und vieles mehr - direkt im heise shop online kaufen
Warenkorb Ihr Warenkorb ist noch leer.
12,99 €*

Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)

How to protect (PII) and (PHI)?
eBook

Bewerten Sie dieses Produkt als Erster

Essay from the year 2019 in the subject Computer Science - IT-Security, , language: English, abstract: PII is Personal Identifiable Information is the information that can be used on its own or with other information to identify, contact, or locate a single person and it is maintained by the information technology department of any organization....
Sofortige Lieferung
Autor: Haitham Ismail
Anbieter: Grin Verlag
Sprache: Englisch
EAN: 9783668928930
Veröffentlicht: 29.04.2019
Format: PDF
Schutz: DRMfrei Diese Digitale Ausgabe ist ohne DRM-Schutz.
Essay from the year 2019 in the subject Computer Science - IT-Security, , language: English, abstract: PII is Personal Identifiable Information is the information that can be used on its own or with other information to identify, contact, or locate a single person and it is maintained by the information technology department of any organization. An example of PII is data like names, place or date of birth, email address, National ID, Passport Number, employment information finical or medical records, etc. Likewise, PHI has Protected health information according to HIPA is any health information whether oral or recorded in any form of media which is created or received by a health care provider, public health authority, employer, life insurer or hospital. PII and PHI are different from any kind of data as it should be collected, maintained and disseminated according to fair information practice which is the base of Laws and regulations. In this article, we will discuss what is needed to make your organization able to handle securely and according to privacy laws. Furthermore, it will help in understanding the basic concepts of industry standards like HIPAA Security rule. Finally, it has recommendation and guidelines to be followed when protecting information
Um bewerten zu können, melden Sie sich bitte an