Cloud 101CircleEventsBlog
CAIQ Lite is now accepted into the STAR Registry! Showcase your cloud security readiness with a simplified assessment. Learn more today!

Download Publication

Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation
Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation

Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation

Release Date: 02/07/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding will enable the HDO to implement a privacy risk management program to address privacy concerns. The HDO must be concerned with Protected Health Information (PHI) and personally identifiable information (PII) and provide mitigating controls for both types of information. In this paper, the author will address the issue of privacy engineering and risk management, various privacy laws and regulations, and how to comply throughout the cloud data lifecycle. This paper will benefit privacy engineers, privacy officers, and information security specialists. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
AI in Medical Research: Applications & Considerations
AI in Medical Research: Applications & Consider...
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Healthcare & Cybersecurity: Navigating a Vast Attack Surface
Healthcare & Cybersecurity: Navigating a Vast Attack Surface
Published: 10/08/2024
Cybersecurity Risk Mitigation Recommendations for 2024-2025
Cybersecurity Risk Mitigation Recommendations for 2024-2025
Published: 10/08/2024
Why You Should Have a Whistleblower Policy for AI
Why You Should Have a Whistleblower Policy for AI
Published: 10/07/2024
How to Maximize Alignment Between Security and Compliance Teams
How to Maximize Alignment Between Security and Compliance Teams
Published: 10/04/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training