What Does It Mean To Be A Privacy Professional?

Slides:



Advertisements
Similar presentations
Electronic Medical Records: Implications of HIPAA for Selecting and Implementing an EMR Todd Frech Senior Partner
Advertisements

PUBLIC INTEREST AND COMMON GOOD BY BRUCE JENNINGS, DANIEL CALLAHAN, AND SUSAN M. WOLF.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Health information security & compliance
CHAPTER 1 : SECRETARY. Secretary is a person who conducts correspondence, maintains records and does ministerial and administrative work. This subject.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
Chapter Extension 22 Managing Computer Security Risk © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Steps to Compliance: Risk Assessment PRESENTED BY.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Value, Vision, Mission, and Strategic Goals
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
HIPAA PRIVACY AND SECURITY AWARENESS.
Compliance Risks for Clinical Laboratories Sandra van der Vaart, Esq. Sixth Annual National Congress on Health Care Compliance February 7, 2003.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
HIPAA EFFECTS OF HEALTH CARE LEGISLATION. Evaluation of the influences of HIPAA  How it affected health care system  How it works as a law  Changes.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Marketing Ethics and Social Responsibility
Privacy, Confidentiality, Security, and Integrity of Electronic Data
ICS424 Computer and Professional Ethics Aj. Thoranin Intarajak.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
IT Professionalism Ethics Modified by Andrew Poon.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
MODULE TWO: Ethical and Legal Issues. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Define.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
The Internet of Things and Consumer Protection
Role of Montana State Fund. Montana State Fund is committed to the health and economic prosperity of Montana through superior service, leadership and.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Ethical & Legal Issues MODULE FIVE:. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Understand.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
The Privacy Symposium August 22, 2007 ©2007. Goodwin Procter LLP The Ethics and Responsibilities of a Privacy Professional.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
BUSINESS INFORMATION SYSTEMS
An Information Security Management System
Privacy and the Law.
MGMT 452 Corporate Social Responsibility
Information Systems Sarika Agarwal.
Objectives Understand legal aspects of software
MGMT 452 Corporate Social Responsibility
HIPAA CONFIDENTIALITY
Protecting “High Stakes” PHI
Know Your Value Proposition
Paul T. Smith Davis Wright Tremaine LLP
Health Insurance Portability and Accountability Act
BIS 320 NERD Lessons in Excellence-- bis320nerd.com.
BIS 320 NERD Perfect Education/ bis320nerd.com.
BIS 320 NERD Education for Service-- bis320nerd.com.
BIS 320 Education for Service-- tutorialrank.com
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Privacy Project Framework & Structure
Health Insurance Portability and Accountability Act
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
National Congress on Health Care Compliance
Introduction to Health Privacy
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

What Does It Mean To Be A Privacy Professional?

What DID it mean to be a privacy professional? The Health Care Industry has been protecting data for a long time. Before HIPAA state laws created a complex set of requirements. Medical Record Librarians were leaders in protecting privacy.

What IS A Privacy Professional?

What Part Of The Elephant Are You? Government Officials Marketing Professionals Law Firm Lawyers Advocates Privacy Pros Corporate Compliance Managers Hardware and Software Developers Law School Professors In House Lawyers

2004: 1499 Members 2005: 2170 Members 2006: 2883 Members IAPP Member Growth 2004: 1499 Members 2005: 2170 Members 2006: 2883 Members 2007: 4382 Members 2007 CIPPS: 1563 CIPP-IT launches in 2008 Daily Dashboard: 7103 2007 # as of 11/30/2007

IAPP Privacy Professional Definition A leader who understands the technical, legal and operational aspects of gathering, handling and security personal data, and who can establish and maintain a comprehensive strategic vision for handling all personal data of employees, customers and suppliers of an organization in a manner that is legal, secure and ethical, from the point of acquisition through the point of disposition, thereby gaining public trust in the organization’s role as custodian of the data.

Between A Rock and A Rock

How Are We Really Doing? Privacy notices very few people read. USA Today reported a three fold increase in records compromised by security breaches during 2007. Risks from government use of commercial data. Concerns about internet behavioral profiling.

So What WILL It Mean To Be A Privacy Professional? Moving to Electronic Health Records Need to focus on how better to secure personal data Protecting data at rest Protecting against malicious software Deepen connections to information security professionals