Cloud 101CircleEventsBlog

Download Publication

Protecting the Privacy of Healthcare Data in the Cloud
Protecting the Privacy of Healthcare Data in the Cloud

Protecting the Privacy of Healthcare Data in the Cloud

Release Date: 08/10/2021

The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding will enable the HDO to implement a privacy risk management program to address privacy concerns. The HDO must be concerned with Protected Health Information (PHI) and personally identifiable information (PII) and provide mitigating controls for both types of information. In this paper, the author will address the issue of privacy engineering and risk management, various privacy laws and regulations, and how to comply throughout the cloud data lifecycle. This paper will benefit privacy engineers, privacy officers, and information security specialists. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
Business Risks Explored: Practical Insights for Resilience
Business Risks Explored: Practical Insights for Resilience
Published: 05/03/2024
Livin' on the Edge: Linux's Impact on Computing
Livin' on the Edge: Linux's Impact on Computing
Published: 05/01/2024
Navigating the Cloud – Beyond “Best Practices”
Navigating the Cloud – Beyond “Best Practices”
Published: 05/01/2024
How DSPM Can Help Solve Healthcare Cybersecurity Attacks
How DSPM Can Help Solve Healthcare Cybersecurity Attacks
Published: 04/30/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training