Categories
Government IT Security Outsourced IT

Inadvertent Disclosures under HIPAA

What is an Inadvertent Disclosure under HIPAA? An inadvertent disclosure is an event where a health professional unintentionally reveals protected health information (PHI) to an unauthorized person by mistake. Generally, if PHI is disclosed to unauthorized personnel, a breach of PHI is presumed to have occurred. Depending on the size of the unauthorized disclosure, HHS […]

Categories
IT Security Outsourced IT

Enterprise Risk Profile

What is an Enterprise Risk Profile? Enterprise Risk Management (ERM) is a strategic approach to security management through the use of risk management principles. This management philosophy can be applied to any area of risk including operational, financial, security, compliance, legal risks, and more. Examples of security risks include physical security, cybersecurity, information security, investigations, […]

Categories
Government IT Security Outsourced IT

Metadata Management

What is Metadata? Metadata describes other data; it provides structured reference data that identifies attributes of the information that it describes so that the data can be identified and sorted. Metadata is created anytime a document or file is modified, including when it is deleted. Some examples of basic document file metadata include the author, […]