Premium Content

Access "Nick Mankovich: Maintaining health care privacy and security"

Published: 19 Oct 2012

I confess I used to run away from all professional discussions about privacy. I found them murky and contentious: a bit like religion or politics but peopled with lawyers, legislators, and lobbyists! Still, from my comfort zone of managing security controls I wrestled with the notion of privacy, which seemed to be something inside of confidentiality that kept squeezing out through the cracks to be much, much more. Worlds collide when a researcher says, "Well, it's my data about these patients, so I can give you access." My turning point was purchasing an out-of-print copy of Alan Westin's 1967 book Privacy and Freedom. This prescient, insightful work provided a context for these difficult conversations and prompted me to adopt the following definition: "Privacy is the right of the individual to control information about him or herself." When feeling devilish, I'll throw in "perceived right" just to dangle the red cape and begin a lively discussion among colleagues from different countries. Beyond giving me a chance to reflect on one of the big questions ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...