Hello and welcome back to the H C I S P p certification course lists, library privacy and security relationship.
My name is Shalane Hutchins, and I'm your instructor today.
Today we're going to discuss confidentiality,
dependency and immigration
as it relates to the relationship between privacy and security.
now. The relationship between security or cybersecurity and privacy is complex.
cybersecurity that protects data from intrusion left and misuse
obviously, is a significant privacy safeguard.
But on the other hand, cyber security measures that monitor access and use can implicate the collection of personal information and thus raise privacy concerns.
Irrelevant example Is one facing our country today with contact tracing.
It would be helpful for public health officials and local governments to be able to trace and track those who have tested positive for covert 19 and know the places they've spent time. During that time, they may have been contagious.
Knowing where people spent time and who they spent time with is very important and notifying those persons I was expected exposure to the virus. However, some people have concerns of their information being used for purposes other than ensuring public safety of others.
Would you share your data if you had tested positive?
It's a very personal decision.
Other privacy concerns are around some cybersecurity defense techniques that may require monitoring in collection of personal information,
such as a network and system monitoring and background checks.
It's important to know what information is traversing organizations network, especially while users air working from home.
information identified in an employee's background check should be used for purposes of whether the person receives an offer of employment and nothing fervor Burger.
Many companies now include a credit check in addition to the standard criminal background check.
The confidentiality is the relationship between security rules and standards and are complementary to the privacy rules and standards.
Various privacy rules discussed the personal relationship between the individual providing the data
and those using the data for particular purposes.
Security rules tend to discuss how the data will be secured and protected.
Security professionals in the health care industry should be familiar with the Affordable Care Act.
American citizens expect that their rights to privacy will be honored and their data will remain confidential and secure.
Privacy protections depend on adherence to security standards.
Two of the three tenants of the C I A. Triad
confidentiality and integrity
are both principles designed to protect the data from unauthorized disclosure and to ensure the data is provided. Um, does not change.
The third tenant availability is important Onley in the fact that they that should be available and not lost or misplaced.
If any of these tenants are violated, an overall sense of distrust comes into play.
It's important for the health care security practitioner toe. Understand how each security control wraps the layer of privacy protection around the data.
Security controls Air Integrated
The health care security professional must identify initial risks but also have a process for constantly obtaining new information about threats so adequate protections can be applied
System configuration change AH, software's upgraded software vulnerabilities are discovered and Attackers will find new methods for trying to compromise sensitive healthcare data.
Privacy and security tasks are integrated due to the need for the implementation of change management programs, anti virus and malware detection software
as well assistant patching training and awareness in order to establish an effective security and privacy program.
It's less test your knowledge
privacy concerns exist around security measures that monitor and collect data.
That answer is true.
Let's try another one.
Privacy depends on adherence to security standards.
Once again, that answer is true,
privacy and security tasks are separated in order to establish an effective privacy and security program
that one is false. The privacy and security task must be integrated
in order to establish an effective program.
So in this video, we review the confidentiality, dependency and integration as it relates to privacy and security relationships. Next up will be handling sensitive data season.