Last fall I blogged about Microsoft’s HealthVault, “Why Would You Trust Microsoft To Store Your Sensitive Health Information?”
It didn’t take long before Google got in on the game.
Today an interesting story ran in the New York Times, “Warning on Storage of Health Records” that also points out the concerns with having huge amounts of health information stored in some mega-multi-services-products types of monolith company. The issues are the same for any organization storing such information, though; but putting health information in the same corporate systems that contain the records of billions of people really open up quite a Pandora’s box of privacy breach possibilities.
Here are some excerpts from the news story that make some good points…
Posts Tagged ‘privacy’
Revisiting Online Medical Information Storage Houses Points To Consistent Need For *1* Federal Privacy Law
Thursday, April 17th, 2008Privacy and Security Lost And Found
Monday, April 14th, 2008Today I’ve been participating in a very interesting discussion on the Security Catalyst Community about a very interesting project that Scott Wright is doing with Honey Sticks at his site.
Part of the discussion led to the possibility that one of the Honey Sticks that Scott had planted in a hotel, and had been “activated,” may have been turned in to the hotel’s lost and found.
Phisherthieves Like Banks Best
Wednesday, February 13th, 2008Here’s a pretty good mainstream news story from CNN to give to your business leaders to raise their awareness and understanding about phishing…
$54 Million Lawsuit Against Best Buy For Losing Laptop
Wednesday, February 13th, 2008I knew the civil suits for lost laptops would start soon. Thanks so much to my buddy Alec for pointing out this story to me!
Raelyn Campbell took a laptop computer to Best Buy to get fixed, and three months later, after giving Campbell the run-around, Best Buy admitted to her that they lost the computer.
Give a Hoot, Don’t Privacy Pollute!
Tuesday, February 12th, 2008I just saw a term that can be used really well with non-technical folks, “data pollution.”
I wish I had thought of that term!
U.S. DoD Workers Give Military Secrets To China
Monday, February 11th, 2008Here are two more insider threat incident examples to put into your files and use within your information security and privacy training curriculum and awareness communications:
Blog Info OK’d To Use To Make Medical Insurance Coverage Decision
Monday, February 11th, 2008Hopefully most people know by now that whatever you post on the Internet is not private, and that basically anyone can read it. Hopefully most people know by now that it is a growing trend for employers to use information they find on the Internet in their hiring and firing decisions.
Well, it appears the information found on the Internet can now be used by insurers to make decisions about to whom they will and will not provide insurance.
New Information Technology Crime Law in Saudi Arabia
Saturday, February 9th, 2008Here’s an interesting new law in Saudi Arabia…
Two Types Of Young Hackers
Friday, February 8th, 2008Here’s an interesting juxtaposition of hacker-related news articles…
When scanning today’s news I saw the headline, “Teen Is World’s Youngest ‘Ethical Hacker’”