Privacy Research at Carnegie Mellon (A Sampling)
|
|
|
- Herbert Logan
- 10 years ago
- Views:
Transcription
1 Privacy Research at Carnegie Mellon (A Sampling) Jeannette M. Wing President s Professor of Computer Science Department Head Computer Science Department Information Security and Privacy Advisory Board NIST 30 May 2012
2 Breadth of Approaches from Across CMU Science Algorithms Game Theory Formal Methods Machine Learning Programming Languages Statistics Engineering Distributed Systems Human-Computer Interaction Mobile and Pervasive Computing Networking Security Software Engineering Societal Behavioral and Social Science Economics Ethics and Philosophy Public Policy ISPAB 2 Alessandro Acquisti Avrim Blum Travis Breaux Lorrie Cranor Anupam Datta Stephen Fienberg Virgil Gligor Anupam Gupta Bob Harper Jason Hong Jiashun Jin Ramayya Krishnan Peter Madsen Rema Padman Frank Pfenning Bhiksha Raj Alessandro Rinaldo Norm Sadeh M. Satyanarayanan Tuomas Sandholm Srini Seshan Larry Wasserman Jeannette Wing Eric Xing 24 faculty, 6 Schools/Centers, 10 Departments Jeannette M. Wing
3 Sampling of Three Foci Auditing, Accountability, Compliance Formal Methods: Anupam Datta, Jeannette Wing Software Engineering: Travis Breaux Applications to Healthcare: Travis Breaux, Rema Padman, Jeannette Wing Public (Government) Databases Statistical, e.g., Differential Privacy Sanitized Databases: Avrim Blum Practical Limits: Steve Fienberg, Alessandro Rinaldo, Larry Wasserman Vulnerabilities: Alessandro Acquisti ISPAB Consumer-centric Usability: Lorrie Cranor Location privacy: Jason Hong, Norm Sadeh Behavioral Economics: Alessandro Acquisti 3 Jeannette M. Wing
4 Auditing, Accountability, Compliance Checking 4
5 Formal Methods: Semantics of Use and Purpose [IEEE Security and Privacy 2012] Michael Tschantz, Anupam Datta, Jeannette Wing Computer Science Department, CyLab 5
6 Purpose in EU Law Member States shall provide that personal data must be [... ] collected for specified, explicit and legitimate purposes and not further processed in a way incompatible with those purposes 6
7 Purpose in Yahoo s Policy Yahoo!'s practice is not to use the content of messages [ ] for marketing purposes. 1 This information is transmitted [ ] for the purpose of registering your web address [ ]. 1 Yahoo! uses information for the following general purposes: to customize the advertising [ ]. 2 Yahoo! does not contact children [ ] for marketing purposes [ ]. 2 [ ] companies who may use this information for their own purposes
8 Purpose in HIPAA [ ] use and disclose protected health information [...] for the following purposes or situations: (1) To the Individual (unless required for access or accounting of disclosures); (2) Treatment, Payment, and Health Care Operations; 9
9 Purpose in Government Agency Policies By providing your personal information, you give [SSA] consent to use the information only for the purpose for which it was collected. We describe those purposes when we collect information. 10
10 Auditing Privacy Policy Agent Behavior Environment Model Obeyed Inconclusive Violated 11
11 Auditing Purpose Restriction Obeyed Log File Inconclusive MDP Violated 12
12 Auditing Record only for treatment [q0, send record] Violated 13
13 Languages and Software Architecture: Exceptions in Law and Patterns of Compliance Travis Breaux Institute for Software Research School of Computer Science 14
14 Handling Legal Exceptions [IEEE TSE, January 2008] HIPAA (f)(2): Except for disclosures required by law as permitted by paragraph (f)(1), a CE may disclose PHI in response to a law enforcement (LE) official's request for the purpose of identifying or locating a suspect 178 (to LE for reporting gunshot wounds) (to LE, by subpoena) 182 (to LE for identifying suspect) disclosures permitted by (f)(1) Key: Leads from lower to higher priority 15
15 Requirements Exception Hierarchy [IEEE TSE, January 2008] 16
16 Shaping Policy via Distributed Conditionality SECTION 603A.215 PAR (1) Requirement #1 PAR (2) PAR (a) Requirement #2 PAR (b) Requirement # Definitions and exemptions shape who, when and how requirements are applied in practice The language employs distributed controls to shape conditionality PAR (4) PAR (a) Exemption #A A EXEMPT PAR (5) PAR (a) data storage device... PAR (c) facsimile PAR (d) SECTION payment card INCLUDE INCLUDE EXTERNAL 17
17 Language-supported Compliance AR-7: SHALL disclose breach REFINES (a)(1) AR-10 AR-8 AR-8: SHALL disclose expediently Process Suspension AR-10: MAY delay disclosure (law enforcement) AR-10 AR-11 AR-11: SHALL disclose breach Patterns FOLLOWS EXCEPT (c)(1) MD-10 MD-7 Design Alternatives MD-15 MD-16 MD-17 MD-(7,10): SHALL notify individual, owner and licensee MD-(15-17): MAY provide MD-18 written, electronic, telephonic notice MD-18: MAY provide substitute notice NV-6: SHALL not transfer data outside system NV-6 NV-5 NV-5: SHALL comply with PCI Data Security Standard Indemnification NV-8: SHALL not be liable for breach damages NV-8 NV-7 NV-7: SHALL not move data storage devices VT-40 VT-41 VT-42 VT-43 VT-(40-45): SHALL not use, transmit, disclose or require SSNs VT-47 VT-48 VT-49 VT-47: may continue to use the SSN, if use has been continuous since January 1, 2007 Legacy System Evolution 18
18 Statistics: Release of Public (Government) Data In this section, all slides with a black background are from Avirm Blum. 19
19 20
20 Outputting Sanitized Databases Using Differential Privacy Avrim Blum Computer Science Dept 21
21 What about outputting sanitized databases? So far, just question-answering. Each answer leaks some privacy at some point, have to shut down. What about outputting a sanitized database that people could then examine as they wish? And is related to the original database 22
22 What about outputting sanitized databases? Could ask a few questions (using previous mechs) and then engineer a database that roughly agrees on these answers. But really, we want a database that matches on questions we haven t asked yet. Do you need to leak privacy in proportion to number of questions asked? 23
23 What about outputting sanitized databases? d n Actually, no you don t [Blum-Ligett-Roth] Fix a class C of quantities to preserve. E.g., fraction of entries with x[i 1 ]=1, x[i 2 ]=0 x[i k ]=1. Want -privacy and preserve all q C up to. [BLR] show: in principle, can do with database of size only n = O(d log C ). 24 (At least not for count-queries) Allowing exponentiallymany questions!
24 25
25 Differential Privacy for Protecting Multi-dimensional Contingency Table Data: Extensions and Applications, Journal of Privacy and Confidentiality,
26 27
27 Positives: Differential Privacy summary Clear semantic definition. Any event (anything an adversary might do to you) has nearly same prob if you join or don t join, lie or tell the truth. Nice composability properties. Variety of mechanisms developed for question answering in this framework. *Some* work on sanitized database release. 28
28 Differential Privacy summary Negatives / open issues It s a pessimistic/paranoid quantity, so may be more restrictive than needed. is not zero. Privacy losses add up with most mechanisms (but see, e.g., [RR10],[HR10]) Doesn t address group information. Notion of neighboring database might need to be different in network settings. 29
29 Consumer-Centric: Usability, Location Privacy, Behavioral Economics 30
30 CUPS Lab Privacy Research Overview Engineering & Public Policy Lorrie Faith Cranor May
31 Towards a privacy nutrition label Standardized format People learn where to find answers Facilitates policy comparisons Standardized language People learn terminology Brief People find info quickly Linked to extended view Get more details if needed Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach [Kelley, Cesca, Bresee, and Cranor, CHI 2010] 32
32 Online behavioral advertising notice and choice Tools that facilitate notice and choice about OBA are part of self-regulatory privacy efforts Browsers can block cookies Opt-out cookies, AdChoices icon Browser plugins Series of studies to investigate user understanding of OBA and usability of tools Users understand little about OBA, unaware of tools Tools are difficult to configure properly Users don t know enough about ad companies to choose between them Users unfamiliar with Adchoices icon and afraid to click on it 33
33 CMU privacy nudges project Goal: Study, design, and test systems that anticipate and sometimes exploit cognitive and behavioral biases that hamper users privacy and security decision making Multidisciplinary project: behavioral economics + decision sciences + machine learning + human computer interaction +. Social network regrets Surveyed users about things they regret doing on Facebook and Twitter, identified categories of regrets and underlying causes Nudge prototypes Testing software that will nudge FB and Twitter users before they post, e.g., with photos of random friends or a countdown timer I Regretted the Minute I Pressed Share: A Qualitative Study of Regrets on Facebook. [Wang, Komanduri, Leon, Norcie, Acquisti, Cranor 2011] 35
34 Location Privacy Norman M. Sadeh Professor, ISR - School of Computer Science Director, Mobile Commerce Lab. Co-Director, COS PhD Program Carnegie Mellon University 36
35 Empowering Users to Regain Control of their Privacy Mobile Apps collect a wide range of information about their users Research combining: Understanding people s privacy preferences? How diverse? How complex? Do they change? User-Oriented Machine Learning/AI: Can we learn people s preferences through selective dialogues? Better Uis Informed by Large-Scale Deployments (e.g. location sharing app) Copyright Norman M. Sadeh 37
36 Diverse and Complex Privacy Preferences Each square represents a different individual and displays her willingness to share her location with members of the CMU campus community Green: Share Red: Don t In each square: Horizontal axis: 7 days of the week Vertical axis: 24 hours of the day Copyright Norman M. Sadeh 38
37 39 Jeannette M. Wing
38 PNAS 2009, NY Times big splash article 40 Jeannette M. Wing
39 Experimental studies over ~8 years on behavioral economics of privacy A sampling of results: Individuals more likely to disclose sensitive information to unprofessional sites than professional sites. People assign different values to their personal information depending on whether they are focusing on protecting it or revealing it People may make disclosure decisions that they stand to later regret. Risks greatly magnified in online information revelation 41 Jeannette M. Wing
40 42 Jeannette M. Wing
41 Privacy in Social Networks Behavioral Economics: Alessandro Acquisti Control vs. Access/Use: Giving more control to users (in online social networks) over information publication seems to generate higher willingness to disclose sensitive information Statistical: Avrim Blum and Anupam Datta Given a sensitive social network, can we release a sanitized version of it that preserves privacy and is still useful? Inspired by differential privacy work. Formal Methods: Bob Harper and Jeannette Wing What is a formal logic for reasoning about privacy properties in a social network? Uses a linear, epistemic logic. 43 Jeannette M. Wing
42 Breadth of Approaches from Across CMU Science Algorithms Game Theory Formal Methods Machine Learning Programming Languages Statistics Engineering Distributed Systems Human-Computer Interaction Mobile and Pervasive Computing Networking Security Software Engineering Societal Behavioral and Social Science Economics Ethics and Philosophy Public Policy ISPAB 44 Alessandro Acquisti Avrim Blum Travis Breaux Lorrie Cranor Anupam Datta Stephen Fienberg Virgil Gligor Anupam Gupta Bob Harper Jason Hong Jiashun Jin Ramayya Krishnan Peter Madsen Rema Padman Frank Pfenning Bhiksha Raj Alessandro Rinaldo Norm Sadeh M. Satyanarayanan Tuomas Sandholm Srini Seshan Larry Wasserman Jeannette Wing Eric Xing 24 faculty, 6 Schools/Centers, 10 Departments Jeannette M. Wing
43 Thank you!
Privacy through Accountability: A Computer Science Perspective
Privacy through Accountability: A Computer Science Perspective Anupam Datta Associate Professor Computer Science, ECE, CyLab Carnegie Mellon University February 2014 Personal Information is Everywhere
Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:
HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
Zep Inc.: Global Online Privacy Notice
Zep Inc.: Global Online Privacy Notice Effective Date: March 26, 2015 We at Zep Inc., along with our affiliates (collectively, Zep ), respect your concerns about privacy. This Global Online Privacy Notice
21CT, Inc. +1 512 694-8971 6011 W. Courtyard Drive [email protected] Austin, Texas 78730 USA
JONATHAN MUGAN Curriculum Vitae 21CT, Inc. +1 512 694-8971 6011 W. Courtyard Drive [email protected] Austin, Texas 78730 USA http://www.jonathanmugan.com RESEARCH INTERESTS My research focuses
Contact Us. Information We Collect. Petzi s Privacy Policy: Last Updated: October 8, 2015
Petzi s Privacy Policy: Last Updated: October 8, 2015 Petzila, Inc. ( Petzi ) is committed to protecting your privacy. We have prepared this privacy policy ( Policy ) to describe to you our practices regarding
Optum Website Privacy Policy
Optum Website Privacy Policy 1 Privacy Website Privacy Policy Introduction We recognize that the privacy of your personal information is important. The purpose of this policy is to let you know how we
Rise Broadband Networks, Inc. Privacy Policy and Customer California Privacy Rights. Effective date: January, 2016
Networks, Inc. Privacy Policy and Customer California Privacy Rights Effective date: January, 2016 knows Customers care about how their personally identifiable information ( Personal Information ) is used
ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015
ETHICAL ELECTRIC PRIVACY POLICY Last Revised: December 15, 2015 This policy ("Policy") covers the privacy practices that Ethical Electric, Inc. ("Ethical Electric", "we" or "us") employs with respect to
This notice describes how psychological and medical information about you may be used and disclosed and how you can get access to this information.
Page 1 of 5 HIPAA Notification Policies and Practices to Protect the Privacy of Your Heath Information This notice describes how psychological and medical information about you may be used and disclosed
Isaac Willett April 5, 2011
Current Options for EHR Implementation: Cloud or No Cloud? Regina Sharrow Isaac Willett April 5, 2011 Introduction Health Information Technology for Economic and Clinical Health Act ( HITECH (HITECH Act
Synapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
Privacy Policy. log in to the Services with social networking credentials;
Privacy Policy Effective Date: November 20, 2015 This Privacy Policy is incorporated by this reference into the Mobli Media Inc. Terms of Use located at https://www.mobli.com/tou.html (the Terms of Use
Personal Information and the MGM Resorts International Web Site
GLOBAL PRIVACY POLICY MGM RESORTS INTERNATIONAL EFFECTIVE: March 1, 2012 MGM Resorts International values your patronage and respects your privacy. This Privacy Policy ("Policy") describes the privacy
Information Security: Cloud Computing
Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration
SDC-League Health Fund
SDC-League Health Fund 1501 Broadway, 17 th Floor New York, NY 10036 Tel: 212-869-8129 Fax: 212-302-6195 E-mail: [email protected] NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
PRIVACY AND SECURITY SURVIVAL TRAINING
PRIVACY AND SECURITY SURVIVAL TRAINING 1.Typeorcutandpastethislinkintothe addressbar: http://hrwebdev.dhs.lacounty.gov/attestation/ 2.Clickthe downarrow 3.Select 2013Privacyand SecuritySurvivalHandbook
NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.
NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. This Privacy Statement applies to the web sites mobile applications provided by Learn Fresh Education Co. (collectively,
NorthStar Alarm Services. Website Privacy Policy
NorthStar Alarm Services Website Privacy Policy NorthStar Alarm Services ( NorthStar ) values your privacy. To that end, we strive to provide a safe, secure online user experience for you. In this Privacy
Estée Lauder Companies Global Jobs Website Privacy Policy
Effective Date: August 14, 2014 Estée Lauder Companies Global Jobs Website Privacy Policy The Estée Lauder Companies ( we, us, or our ) respects your concerns about privacy and value the relationship we
HIPAA and You The Basics
HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information
SCDA and SCDA Member Benefits Group
SCDA and SCDA Member Benefits Group HIPAA Privacy Policy 1. PURPOSE The purpose of this policy is to protect personal health information (PHI) and other personally identifiable information for all individuals
Privacy Policy. MSI may collect information from you on a voluntary basis when you:
Last Updated: January 8, 2015 Privacy Policy Mind Sports International (MSI) respects the privacy rights of our customers and online visitors, and has adopted this privacy policy ("Privacy Policy") to
Beasley Broadcast Group, Inc. Privacy Policy
Beasley Broadcast Group, Inc. Privacy Policy Last Updated and Effective December 31, 2015 This Privacy Policy has been updated to include a section regarding your California privacy rights if you are a
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
THE BUSINESS COUNCIL OF WESTCHESTER Website & Internet Services Terms And Conditions of Use
THE BUSINESS COUNCIL OF WESTCHESTER Website & Internet Services Terms And Conditions of Use PLEASE READ THE FOLLOWING TERMS AND CONDITIONS RELATING TO YOUR USE OF OUR WEBSITE AND ANY OTHER INTERNET-BASED
Adaptive Business Management Systems Privacy Policy
Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy What is HIPAA? Health Insurance Portability and Accountability Act (HIPAA) is broad federal legislation that includes
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
Appendix : Business Associate Agreement
I. Authority: Pursuant to 45 C.F.R. 164.502(e), the Indian Health Service (IHS), as a covered entity, is required to enter into an agreement with a business associate, as defined by 45 C.F.R. 160.103,
How To Write A Community Based Care Coordination Program Agreement
Section 4.3 Implement Business Associate and Other Agreements This tool identifies the types of agreements that may be necessary for a community-based care coordination (CCC) program to have in place in
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
AdvancedMD Online Privacy Statement
AdvancedMD Online Privacy Statement Effective date: September 1, 2015 This Privacy Statement explains how AdvancedMD uses and discloses personal information that we collect from people who visit our websites
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
NOTICE OF PRIVACY PRACTICES Walter Chiropractic Clinic, 5219 Peters Creek Rd Ste 5, Roanoke VA 24019
Effective Date: 5/18/15 NOTICE OF PRIVACY PRACTICES Walter Chiropractic Clinic, 5219 Peters Creek Rd Ste 5, Roanoke VA 24019 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED
PRIVACY NOTICE. Last Updated: March 24, 2015
PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
RUTGERS POLICY. Responsible Office: RBHS Office of Ethics, Compliance & Corporate Integrity
RUTGERS POLICY Section: 100.1.3 Section Title: HIPAA Policies Policy Name: Accounting Disclosures of Health Information Formerly Book: 00-01-15-20:00 Approval Authority: RBHS Chancellor Responsible Executive:
PRIVACY POLICY. I. Introduction. II. Information We Collect
PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting
WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY
WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY Your privacy is important to us. At WidePoint Solutions Corp. we value your trust. We want you to know how we collect, use, and share and protect information
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Privacy Policy & Terms of Use Effective: 12/13/2011. Terms and Conditions. Changes in this Privacy Policy. Internet Privacy & Security
Privacy Policy & Terms of Use Effective: 12/13/2011 Terms and Conditions Schoology (the "Service") provided by Schoology, Inc. ("Schoology") with permission of your local school, local school district,
Eric Moriak - CISSP, CISM, CGEIT, CISA, CIA Program Manager - IT Audit Children s Medical Center Dallas. Dallas, Texas
Eric Moriak - CISSP, CISM, CGEIT, CISA, CIA Program Manager - IT Audit Children s Medical Center Dallas Dallas, Texas Objectives The purpose of this presentation is to develop a general awareness of DLP/SIEM
BRIGHTBYTE LTD. TERMS OF BUSINESS
BRIGHTBYTE LTD. TERMS OF BUSINESS 1 / 10 BRIGHTBYTE LTD. TERMS OF BUSINESS 07/07/2014 DEFINITIONS TERMS: The Terms of Business specified in this document. BRIGHTBYTE STUDIO BrightByte Ltd (Registered No:
The Canadian Self-Regulatory Program for Online Behavioural Advertising
1 The Canadian Self-Regulatory Program for Online Behavioural Advertising Introductory Webinar Adam Kardash Bridget McIlveen Osler, Hoskin & Harcourt LLP Counsel to the Digital Advertising Alliance of
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Business Associate Agreement (BAA) Guidance
Business Associate Agreement (BAA) Guidance Introduction The purpose of this document is to provide guidance for creating or updating business associate agreements between your Practice ( Covered Entity
TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS
TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS JULY 2012 Overview Members of the toy industry are fast embracing the world of mobile applications ( apps ). Apps offer a new world of engaging content
Privacy Policy. PortfolioTrax, LLC. 2015 v1.0. PortfolioTrax, LLC Privacy Policy 2
Privacy Policy 2015 v1.0 Privacy Policy 2 Document Controls and Review This document is to be reviewed once every two quarters and updated to account for any changes in privacy practices that may not have
Privacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
STATE SUPPLEMENTAL HEALTH PRIVACY LAWS
AL None N/A AK None N/A AZ None N/A AR None N/A CA Health and Safety Code 1280.15 Civil Code 56.101 Civil Code 56.13 Civil Code 56.17 Civil Code 56.20 Requires clinics and health facilities to report any
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Connecticut Pipe Trades Health Fund Privacy Notice. 2013 Restatement
Connecticut Pipe Trades Health Fund Privacy Notice 2013 Restatement Section 1: Purpose of This Notice and Effective Date THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED
State University of New York at Canton Institutional Review Board. Sample Informed Consent Document
State University of New York at Canton Institutional Review Board Sample Informed Consent Document The following sample informed consent document includes instructions to the person writing the document,
Privacy and Online Behavioral Advertising
Event hashtag: #truste2011 TRUSTe Research In partnership with Harris Interactive 2011 Consumer Research Results Privacy and Online Behavioral Advertising July 25, 2011 1 Welcome: TRUSTe Overview Mission:
Zubi Advertising Privacy Policy
Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji
1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?
Troubleshooting and Frequently Asked Questions FollowMyHealth Patient Portal 1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address
Interactive Communications International, Inc. Privacy Policy Your Privacy Rights
Interactive Communications International, Inc. Privacy Policy Your Privacy Rights Effective Date June 9 th 2014 (last updated June 9 th 2014) This Privacy Policy applies to the sites and apps where it
Computing Services Information Security Office. Security 101
Computing Services Information Security Office Security 101 Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification,
HIPAA Privacy & Security Training for Clinicians
HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( BAA ) is by and between the National Association of Boards of Pharmacy
ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT
ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites 1 as well as through the Moxi User
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT The parties to this ( Agreement ) are, a _New York_ corporation ( Business Associate ) and ( Client ) you, as a user of our on-line health record system (the "System"). BY
Service Agreement: January 2008
International Consultants in Medicine Service Agreement: January 2008 Prior to enrolling in the service as a Member of any degree, you must agree to the following terms and conditions. You may accept these
