Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencia de la Computación - IT-Security

Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)

How to protect (PII) and (PHI)?

Título: Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)

Ensayo , 2019 , 12 Páginas

Autor:in: Haitham Ismail (Autor)

Ciencia de la Computación - IT-Security
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

PII is Personal Identifiable Information is the information that can be used on its own or with other information to identify, contact, or locate a single person and it is maintained by the information technology department of any organization. An example of PII is data like names, place or date of birth, email address, National ID, Passport Number, employment information finical or medical records, etc. Likewise, PHI has Protected health information according to HIPA is any health information whether oral or recorded in any form of media which is created or received by a health care provider, public health authority, employer, life insurer or hospital. PII and PHI are different from any kind of data as it should be collected, maintained and disseminated according to fair information practice which is the base of Laws and regulations. In this article, we will discuss what is needed to make your organization able to handle securely and according to privacy laws. Furthermore, it will help in understanding the basic concepts of industry standards like HIPAA Security rule. Finally, it has recommendation and guidelines to be followed when protecting information

Extracto


Table of Contents

1. PHI & PII Protection

2. Abstract.

3. Introduction

4. Policies, Procedures and Proper Documentation.

4.1 Policies and Procedures

4.2 Other documentation required.

5. Awareness, Training, and Education

6. Security Controls

7. Incident Response Plan

8. Audits

9. Author Recommendations

Objectives and Topics

The primary objective of this work is to provide a comprehensive framework for organizations to securely handle Personally Identifiable Information (PII) and Protected Health Information (PHI) in compliance with privacy laws and industry standards. It addresses the critical need for due care and diligence in data management, guiding organizations through the implementation of technical, administrative, and physical security measures.

  • Regulatory compliance with HIPAA and NIST standards.
  • Development of robust security policies and documentation protocols.
  • Implementation of effective IT security awareness and training programs.
  • Utilization of security controls and incident response strategies.
  • Strategic recommendations for infrastructure hardening and system security.

Excerpt from the Book

Policies and Procedures

Organizations should develop, implement, maintain and monitor comprehensive policies and procedure for handling PII and PHI in the organization level, Program or component level and system level (McCallister et al., 2010; Scholl et al, 2008). Below is a sample of policies that are used to protect PHI and PII and its role.

Security Baseline is an example of documents that works as a guide in implementing the minimum level of security on the related subject or technology (Livingston, 2000). For example, the baseline for Systems that are involved with PHI & PII handling (e.g. Server and PC) should be established, followed.

The benefits of having these documents are to have a minimum level of test security controls applied to the server and clients sides. These documents support the Information Security Policy and administrators and users are forced to follow it when handling PHI & PII.

Summary of Chapters

Abstract.: Provides a foundational definition of PII and PHI and outlines the importance of handling this data according to fair information practices.

Introduction: Discusses the necessity for organizations to maintain data throughout its lifecycle according to NIST publications and privacy principles.

Policies, Procedures and Proper Documentation.: Examines the requirement for developing and maintaining organizational policies to ensure the secure handling of sensitive data.

Awareness, Training, and Education: Highlights the role of periodic training and awareness campaigns in building the necessary knowledge to protect PII and PHI.

Security Controls: Details the technical, administrative, and physical controls required to protect the confidentiality of sensitive information systems.

Incident Response Plan: Focuses on the development of reporting and response procedures to effectively mitigate risks and handle data breaches.

Audits: Explains the necessity of internal and external audits to assess risks, review threats, and ensure compliance with industry standards.

Author Recommendations: Offers practical strategies for security compliance, including infrastructure hardening and integration of security solutions.

Keywords

PII, PHI, Data Protection, HIPAA, NIST, Cybersecurity, Information Security, Privacy Laws, Security Controls, Risk Assessment, Incident Response, ISO 27001, Data Breach, Infrastructure Hardening, Confidentiality

Frequently Asked Questions

What is the primary scope of this work?

The work focuses on the methodologies and requirements for protecting Personally Identifiable Information (PII) and Protected Health Information (PHI) within organizational environments.

What are the core thematic areas discussed?

Key areas include the implementation of security policies, staff awareness programs, technical security controls, incident response plans, and auditing processes.

What is the primary objective of this research?

The main goal is to enable organizations to handle sensitive information securely while maintaining compliance with privacy laws and industry standards like HIPAA.

Which scientific and professional standards are applied?

The work relies heavily on NIST publications (such as NIST SP 800-53 and 800-50) and the HIPAA Security Rule as foundational frameworks.

What topics are covered in the main section?

The main section covers the creation of documentation, the establishment of IT security awareness, the deployment of security controls, and specific recommendations for infrastructure and incident management.

Which keywords characterize this document?

Essential keywords include PII, PHI, Data Protection, HIPAA, NIST, Cybersecurity, and Information Security.

Why is the Incident Response Plan emphasized?

It is highlighted because having a structured response mechanism allows organizations to mitigate risks efficiently and demonstrate due diligence when handling data breaches.

How does the author propose to improve organizational security beyond basic compliance?

The author recommends advanced practices such as sandboxing, honeypot technologies, periodic background checks, and the integration of security solutions for better threat visibility.

Final del extracto de 12 páginas  - subir

Detalles

Título
Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
Subtítulo
How to protect (PII) and (PHI)?
Autor
Haitham Ismail (Autor)
Año de publicación
2019
Páginas
12
No. de catálogo
V463630
ISBN (Ebook)
9783668928930
ISBN (Libro)
9783668928947
Idioma
Inglés
Etiqueta
protecting personal identifiable information protected health PII PHI
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Haitham Ismail (Autor), 2019, Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information), Múnich, GRIN Verlag, https://www.grin.com/document/463630
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  12  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint