How to look behind the curtain of emerging health it technologies for security concerns
Learning Areas:Public health or related laws, regulations, standards, or guidelines
Identify provisions of HIPAA regulations (including 2013 updates) that are relevant to their research and use of emerging technologies. Develop basic data security procedures based on best practices to protect health data and mitigate likelihood of breaches. List potential security risks of emerging technologies for public health research/practice and strategies to mitigate risks.
Keyword(s): Risk Assessment, Health Insurance
Qualified on the content I am responsible for because: I am an institutional review board member, where I review research protocols, advise on the security solutions for protocols, and vote on adequency of protections for data. I have focused on protocols that involved CDC, CMS, AHRQ, HRSA, and USAID data. In additiona, I have worked on DfID protocols. I am also an ex-KPMG security auditor that provided security support for Federal civiilian agencies. I have also presented at PRIM&R.
Any relevant financial relationships? No
I agree to comply with the American Public Health Association Conflict of Interest and Commercial Support Guidelines, and to disclose to the participants any off-label or experimental uses of a commercial product or service discussed in my presentation.