SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
[object Object],[object Object],Google Health's Impact on Compliance and Patient Care Raj Goel, CISSP
Google Health's Impact on Healthcare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Google Health's Impact on Healthcare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1936  - SSNs established 1938  - Wallet manufacturer includes secretary's SSN card inside a wallet.  40,000 people thought it was their SSN. Pre-1986  - kids under 14yrs not required Post-1990  - Kids get SSN # with Birth Certificate http://en.wikipedia.org/wiki/Social_Security_number
Did I say TRW/Equifax/Experian Huge? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Your users & staff will want it...anyway ,[object Object],[object Object],[object Object],[object Object],[object Object]
Your users & staff will want it...anyway ,[object Object],[object Object],[object Object],[object Object],[object Object],ISO 8583 - Standard for ATM Transactions 1987 Version 1993 Version 2003 Version Each organization maps their data to the standard when communicating with other firms.  Exactly what Healthcare has been trying to do for 20+ years.
How is Google Marketing Google Health? Currently, working with selected organizations. Employees and Patients of these organizations are invited to use GH. Same marketing model as Gmail or GoogleTalk.  Early adopters get invites which are “limited” in quantity.  Overtime, everyone who wants it will get it. Microsoft HealthVault and GoogleHealth use similar models. Walmart, and other large corporations (Intel, AT&T, Pitney-Bowes, Sanofi-Aventis, etc), are testing/using/rolling out Dossia  to their employees.
What's wrong with Google Health? GH Privacy Policy ,[object Object],[object Object],[object Object]
What's wrong with Google Health? GH Privacy Policy ,[object Object],[object Object],[object Object],These 3 rd  parties and subsidiaries are NOT enumerated. One of Google’s subsidiaries is DoubleClick – one of the reasons HIPAA Privacy & Security rules were created was to protect healthcare data from marketers like DoubleClick.
Google Health's Terms ,[object Object],[object Object],[object Object]
Google Flu Trends ,[object Object],[object Object],[object Object]
Google Flu Trends ,[object Object],[object Object],[object Object],Search for “dark web”
ECPA –  Electronic Communications Privacy Act (1986) ,[object Object],[object Object],[object Object],[object Object]
ECPA –  Electronic Communications Privacy Act (1986) ,[object Object],[object Object],[object Object],[object Object],FBI Abuses Patriot Act http://www.nytimes.com/2007/03/10/washington/10fbi.html Sprint received 8 MILLION law enforcement requests in 13 months http://www.eff.org/deeplinks/2009/12/surveillance-shocker-sprint-received-8-million-law Your Identity for Sale http://money.cnn.com/2005/05/09/pf/security_info_profit/index.htm Google "FBI buys data from private sector"
ECPA – Disclosure Rules ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECPA – Disclosure Rules ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CSO's and CPOs should know about ECPA Employees are forwarding emails to GMAIL because it is fast, easy to use and has copious capacity.  The opposite of most corporate email systems. How many of your employees are forwarding emails to gmail/yahoo/hotmail right now?
ECPA – Disclosure Rules ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Shameless Self-Promo!! Brainlinks provides HIPAA, PCI-DSS and State Privacy Breach law compliance audits Information Security Audits IT Consulting for Healthcare If you like what you're hearing, hire us! www.brainlink.com
US vs WARSHAK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
US vs WARSHAK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],US v Warshak could set the benchmark for online privacy expectations.
US vs WARSHAK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Hackers transfer $ 378,000 from Poughkeepsie to Ukraine http://www.finextra.com/News/fullstory.aspx?newsitemid=21055 ATM hackers steal $ 9 Million in 1 day http://www.wired.com/threatlevel/2009/02/atm/ Banking Trojan steals $ 438,000  http://news.cnet.com/8301-27080_3-10363836-245.html Bank Of America vs. Lopez http://www.americanbanker.com/usb_issues/115_4/-246231-1.html Read “Trends in Financial Crimes” http://www.brainlink.com/news/159/24/InfoSecurity-Issue-7---Trends-In-Financial-Crimes.html
Threats ,[object Object],[object Object],[object Object],[object Object]
Threats ,[object Object],[object Object],[object Object],[object Object],Users treat their computers like cars. They assume there's a lemon law for software, or a seatbelt protecting them from themselves.  Nothing could be further from the truth.
Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why does a PDF reader install a virus scanner? Do you allow your users to install software? Can you roll-back user installations? Can you find rogue software installations? Unlike desktop applications, where you control when updates get applied, Web 2.0 applications can add features, change privacy policies, etc. at anytime, outside your control. Woman loses job after tweeting to Governor Barbour http://www.wlbt.com/Global/story.asp?S=11713360
Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],People like new technology, new tools. However, they don't always understand the risks involved. Web-based applications are integrating with each other (OpenSocial, OpenID, Ebay+Paypal, etc) - Google Buzz merges social networking with contacts Desktop tools are integrating with online systems - Google Desktop, Picasa, etc. - Office 2010 with Facebook & Twitter integration
Other Threats - Online profiles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Threats - Online profiles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],You can purchase a person's online profile report that consolidates information from various social networks, credit reports, etc in a single document. Recruiters are vetting online profiles when interviewing or submitting candidates.
Other Threats - Online profiles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Does your HIPAA Compliance Policy, or Employee handbook, have a procedure for dealing with online postings regarding terminations? How soon after termination can they twitter or facebook or otherwise advertise their new, unemployed, status?
Recommended Reading ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],EMR – Electronic Medical Record – software is deployed by the covered entity PMR/PHR – Personal Medical/Health Record – software adopted by patients to self-manage their medical records.
Raj Goel, CISSP Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 22 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries.  Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues, addressing diverse audiences including technologists, policy-makers, front-line workers and corporate executives.  He also works with community and professional organizations such as the InfraGard, ISC2, and TibetAid.org, and the Association of Cancer Online Research - ACOR.org. ,[object Object]
Contact Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesThomas Benjamin Huggett
 
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings Christina Gagnier
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010DataMotion
 
CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law padler01
 
GDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookGDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookPlr-Printables
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRJenny Ferguson
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyThe Hacker News
 
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...WiTH Collective
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisAngad Dayal
 
GDPR - General Data Protection Regulation
GDPR - General Data Protection RegulationGDPR - General Data Protection Regulation
GDPR - General Data Protection RegulationZero Point Development
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Jason Haislmaier
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber securitynahinworld
 
A privacy tool
A privacy toolA privacy tool
A privacy toolGuang Mo
 
Perkins Analysis on US Patriot
Perkins Analysis on US PatriotPerkins Analysis on US Patriot
Perkins Analysis on US Patriotjessiethe3rd
 

Tendances (20)

Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer Responses
 
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law
 
GDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookGDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e book
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPR
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with Varonis
 
GDPR - General Data Protection Regulation
GDPR - General Data Protection RegulationGDPR - General Data Protection Regulation
GDPR - General Data Protection Regulation
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 
A privacy tool
A privacy toolA privacy tool
A privacy tool
 
Perkins Analysis on US Patriot
Perkins Analysis on US PatriotPerkins Analysis on US Patriot
Perkins Analysis on US Patriot
 

En vedette

2007 Annual Report
2007 Annual Report2007 Annual Report
2007 Annual ReportGafisa RI !
 
inversión totalmente responsable
inversión totalmente responsableinversión totalmente responsable
inversión totalmente responsableKaterine Zuluaga
 
Is too much compliance a bad thing
Is too much compliance a bad thingIs too much compliance a bad thing
Is too much compliance a bad thingPierre Simon, CCEP-I
 
Ral calidad concertada_parte_i
Ral calidad concertada_parte_iRal calidad concertada_parte_i
Ral calidad concertada_parte_iECR Community
 
Ws123112 top100 ata_glance
Ws123112 top100 ata_glanceWs123112 top100 ata_glance
Ws123112 top100 ata_glanceCarlos Serra
 
Xplosion Brand Brief.copy
Xplosion Brand Brief.copyXplosion Brand Brief.copy
Xplosion Brand Brief.copyPaulina Jaswiec
 
Advanced Communication Framework by Media Interface
Advanced Communication Framework by Media InterfaceAdvanced Communication Framework by Media Interface
Advanced Communication Framework by Media InterfacePatrick Hofer
 
Open and Distance Learning Opportunities and e-Learning Services in Turkey
Open and Distance Learning Opportunities and e-Learning Services in TurkeyOpen and Distance Learning Opportunities and e-Learning Services in Turkey
Open and Distance Learning Opportunities and e-Learning Services in TurkeyMehmet Emin Mutlu
 
Referencias APA en la Bibliografía
Referencias APA en la BibliografíaReferencias APA en la Bibliografía
Referencias APA en la BibliografíaGustavo Arcila Roy
 
Acs0525 splenectomy-2005
Acs0525 splenectomy-2005Acs0525 splenectomy-2005
Acs0525 splenectomy-2005medbookonline
 
Markem-Imaje Smart Date 5 thermal transfer
Markem-Imaje Smart Date 5 thermal transferMarkem-Imaje Smart Date 5 thermal transfer
Markem-Imaje Smart Date 5 thermal transferSimt
 
2-Introducción a GNU/Linux
2-Introducción a GNU/Linux2-Introducción a GNU/Linux
2-Introducción a GNU/LinuxDigna González
 
Asi es mi ciudad - Adrien
Asi es mi ciudad - AdrienAsi es mi ciudad - Adrien
Asi es mi ciudad - AdrienJulien Pastre
 
COM 588: THEO Chocolate Marketing Integration Plan
COM 588: THEO Chocolate Marketing Integration Plan COM 588: THEO Chocolate Marketing Integration Plan
COM 588: THEO Chocolate Marketing Integration Plan Melinda Yang
 

En vedette (20)

2007 Annual Report
2007 Annual Report2007 Annual Report
2007 Annual Report
 
inversión totalmente responsable
inversión totalmente responsableinversión totalmente responsable
inversión totalmente responsable
 
Todo repuesto
Todo repuestoTodo repuesto
Todo repuesto
 
Is too much compliance a bad thing
Is too much compliance a bad thingIs too much compliance a bad thing
Is too much compliance a bad thing
 
Ral calidad concertada_parte_i
Ral calidad concertada_parte_iRal calidad concertada_parte_i
Ral calidad concertada_parte_i
 
Ws123112 top100 ata_glance
Ws123112 top100 ata_glanceWs123112 top100 ata_glance
Ws123112 top100 ata_glance
 
Modelo 1 a 1
Modelo 1 a 1Modelo 1 a 1
Modelo 1 a 1
 
Xplosion Brand Brief.copy
Xplosion Brand Brief.copyXplosion Brand Brief.copy
Xplosion Brand Brief.copy
 
Advanced Communication Framework by Media Interface
Advanced Communication Framework by Media InterfaceAdvanced Communication Framework by Media Interface
Advanced Communication Framework by Media Interface
 
Analisis numerico
Analisis numericoAnalisis numerico
Analisis numerico
 
Open and Distance Learning Opportunities and e-Learning Services in Turkey
Open and Distance Learning Opportunities and e-Learning Services in TurkeyOpen and Distance Learning Opportunities and e-Learning Services in Turkey
Open and Distance Learning Opportunities and e-Learning Services in Turkey
 
Referencias APA en la Bibliografía
Referencias APA en la BibliografíaReferencias APA en la Bibliografía
Referencias APA en la Bibliografía
 
Acs0525 splenectomy-2005
Acs0525 splenectomy-2005Acs0525 splenectomy-2005
Acs0525 splenectomy-2005
 
Markem-Imaje Smart Date 5 thermal transfer
Markem-Imaje Smart Date 5 thermal transferMarkem-Imaje Smart Date 5 thermal transfer
Markem-Imaje Smart Date 5 thermal transfer
 
Dna
DnaDna
Dna
 
2-Introducción a GNU/Linux
2-Introducción a GNU/Linux2-Introducción a GNU/Linux
2-Introducción a GNU/Linux
 
Asi es mi ciudad - Adrien
Asi es mi ciudad - AdrienAsi es mi ciudad - Adrien
Asi es mi ciudad - Adrien
 
Downsview Water Service Improvement Study Maps
Downsview Water Service Improvement Study MapsDownsview Water Service Improvement Study Maps
Downsview Water Service Improvement Study Maps
 
Sistemas
SistemasSistemas
Sistemas
 
COM 588: THEO Chocolate Marketing Integration Plan
COM 588: THEO Chocolate Marketing Integration Plan COM 588: THEO Chocolate Marketing Integration Plan
COM 588: THEO Chocolate Marketing Integration Plan
 

Similaire à Google Health - NYHIMA

Health Information Technology Research Paper
Health Information Technology Research PaperHealth Information Technology Research Paper
Health Information Technology Research PaperTonya Strongheart
 
Analysis Of The Employee Rights Act
Analysis Of The Employee Rights ActAnalysis Of The Employee Rights Act
Analysis Of The Employee Rights ActJessica Cannella
 
The Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetThe Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetTracy Aldridge
 
Big Data And Information Privacy
Big Data And Information PrivacyBig Data And Information Privacy
Big Data And Information PrivacySandra Willey
 
Cookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing ImpactCookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing ImpactCMassociates
 
Essay On Cyber Security
Essay On Cyber SecurityEssay On Cyber Security
Essay On Cyber SecurityBecki Roy
 
Notes sensotrend sustainable use-of-data
Notes sensotrend sustainable use-of-dataNotes sensotrend sustainable use-of-data
Notes sensotrend sustainable use-of-dataSitra / Hyvinvointi
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010DataMotion
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...RominaMariaBaltariu
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott mooreScott Moore
 
Personal Information And Network Security
Personal Information And Network SecurityPersonal Information And Network Security
Personal Information And Network SecurityJennifer Reither
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolutionDan Brookman
 
Academic Clustering Paper
Academic Clustering PaperAcademic Clustering Paper
Academic Clustering PaperKaren Nelson
 

Similaire à Google Health - NYHIMA (20)

Health Information Technology Research Paper
Health Information Technology Research PaperHealth Information Technology Research Paper
Health Information Technology Research Paper
 
Analysis Of The Employee Rights Act
Analysis Of The Employee Rights ActAnalysis Of The Employee Rights Act
Analysis Of The Employee Rights Act
 
The Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetThe Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The Internet
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
Big Data And Information Privacy
Big Data And Information PrivacyBig Data And Information Privacy
Big Data And Information Privacy
 
Cookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing ImpactCookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing Impact
 
Essay On Cyber Security
Essay On Cyber SecurityEssay On Cyber Security
Essay On Cyber Security
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Notes sensotrend sustainable use-of-data
Notes sensotrend sustainable use-of-dataNotes sensotrend sustainable use-of-data
Notes sensotrend sustainable use-of-data
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott moore
 
Case Study Superdrug
Case Study SuperdrugCase Study Superdrug
Case Study Superdrug
 
Personal Information And Network Security
Personal Information And Network SecurityPersonal Information And Network Security
Personal Information And Network Security
 
Big data impact and concerns
Big data impact and concernsBig data impact and concerns
Big data impact and concerns
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
 
Academic Clustering Paper
Academic Clustering PaperAcademic Clustering Paper
Academic Clustering Paper
 

Plus de Raj Goel

2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...Raj Goel
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1cRaj Goel
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3hRaj Goel
 
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1cRaj Goel
 
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1dRaj Goel
 
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009Raj Goel
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...Raj Goel
 
2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer PrivacyRaj Goel
 
Grow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedInGrow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedInRaj Goel
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLARaj Goel
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 

Plus de Raj Goel (12)

2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
 
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
 
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
 
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
 
2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy
 
Grow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedInGrow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedIn
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLA
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 

Dernier

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 

Dernier (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 

Google Health - NYHIMA

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. How is Google Marketing Google Health? Currently, working with selected organizations. Employees and Patients of these organizations are invited to use GH. Same marketing model as Gmail or GoogleTalk. Early adopters get invites which are “limited” in quantity. Overtime, everyone who wants it will get it. Microsoft HealthVault and GoogleHealth use similar models. Walmart, and other large corporations (Intel, AT&T, Pitney-Bowes, Sanofi-Aventis, etc), are testing/using/rolling out Dossia to their employees.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.