Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation
Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation

Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation

Release Date: 02/07/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding will enable the HDO to implement a privacy risk management program to address privacy concerns. The HDO must be concerned with Protected Health Information (PHI) and personally identifiable information (PII) and provide mitigating controls for both types of information. In this paper, the author will address the issue of privacy engineering and risk management, various privacy laws and regulations, and how to comply throughout the cloud data lifecycle. This paper will benefit privacy engineers, privacy officers, and information security specialists. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
Neutralizing the Threat with Cloud Remediation
Neutralizing the Threat with Cloud Remediation
Published: 04/23/2024
10 Tips to Guide Your Cloud Email Security Strategy
10 Tips to Guide Your Cloud Email Security Strategy
Published: 04/17/2024
The Widening Overlap Between Cloud Workloads and Cybersecurity
The Widening Overlap Between Cloud Workloads and Cybersecurity
Published: 04/17/2024
How to Audit Your Outdated Security Processes
How to Audit Your Outdated Security Processes
Published: 04/16/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training