IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Health IT: A Framework for Managing Privacy Impact Assessment of Personally Identifiable Data

Health IT: A Framework for Managing Privacy Impact Assessment of Personally Identifiable Data
View Sample PDF
Author(s): Cyril Onwubiko (Research Series Limited, UK)
Copyright: 2015
Pages: 24
Source title: Handbook of Research on Emerging Developments in Data Privacy
Source Author(s)/Editor(s): Manish Gupta (State University of New York at Buffalo, USA)
DOI: 10.4018/978-1-4666-7381-6.ch012

Purchase

View Health IT: A Framework for Managing Privacy Impact Assessment of Personally Identifiable Data on the publisher's website for pricing and purchasing information.

Abstract

Health IT is the use of Information Technology (IT) in healthcare to improve patients' experience, enable quality care, efficiency, speed, and security of the collection, exchange, sharing, and storage of sensitive personal information. But Health IT faces a number of notable challenges ranging from privacy risks to trust and confidence in the use of EHRs. In this chapter, a framework for conducting Privacy Impact Assessment (PIA) of Health IT projects is discussed. Privacy impact assessment is a process through which privacy risks are assessed. The chapter includes recommendations for mitigating identified risks and ensuring compliance to policy and processes for handling and processing of highly sensitive and Personally Identifiable Information (PII).

Related Content

Modeling Processes and Outcomes From Cybersecurity Talent Gaps in Global Labor Markets
Shalin Hai-Jew. © 2019. 18 pages.
View Details View Details PDF Full Text View Sample PDF
The Business Transformation Framework and Enterprise Architecture Framework for Managers in Business Innovation: The Role of Cyber and Information Technology Security in Automated Business Environments
Antoine Trad, Damir Kalpić. © 2019. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Risk Management in Banks: Cyber Risk Insurance
İsmail Yıldırım. © 2019. 13 pages.
View Details View Details PDF Full Text View Sample PDF
Access Control Challenges in Enterprise Ecosystems: Blockchain-Based Technologies as an Opportunity for Enhanced Access Control
Hugo Santos Martins, Sérgio Luís Guerreiro. © 2019. 26 pages.
View Details View Details PDF Full Text View Sample PDF
Developing the Social, Political, Economic, and Criminological Awareness of Cybersecurity Experts: A Proposal and Discussion of Non-Technical Topics for Inclusion in Cybersecurity Education
Marcus Leaning, Udo Richard Averweg. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
Winfred Yaokumah. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
Sandra Blanke, Paul Christian Nielsen, Brian Wrozek. © 2019. 18 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom