Tag: PHI

April 18, 2016 - Michael McGill, Practicum Student, Saskatchewan Polytechnic - Health Information Management Program

Ran$omware… What You Need to Know

Ransomware attacks are happening daily, in fact there is research that suggests that as many as 1600 ransomware attacks occurred per day in Canada in 2015. The attacks range from personal computers where cyber criminals are holding valuable family pictures hostage for hundreds of dollars to hospitals that are being forced to pay tens of... read more

Categories: BlogTags: , , ,

April 12, 2016 - Micheal McGill, Practicum Student, Saskatchewan Polytechnic - Health Information Management Program

Privacy Audits

A privacy audit is a technique for assuring that an organization’s goals and promises of privacy and confidentiality are supported by its practices, thereby protecting confidential information from abuse and the organization from liability and public relations problems. An audit ensures that information processing procedures meet privacy requirements by examining how information is collected, stored,... read more

Categories: BlogTags: , , ,

November 10, 2015 - Sharon Young, Analyst

Privacy Impact Assessments

A Privacy Impact Assessment (PIA) is a process that enables organizations to be proactive in ensuring that a project, program or process is planned or designed in such a way that mitigates or eliminates privacy impacts. What is a privacy impact? A privacy impact is when there are inadequate safeguards to protect information/personal health information,... read more

Categories: BlogTags: , , , , ,

September 22, 2015 - Ron Kruzeniski, Information and Privacy Commissioner

Snooping: When Will People Learn?

Before being appointed Commissioner, my reading, studying and listening to the media caused me to really be concerned about staff snooping into personal information (PI) or personal health information (PHI) when there was no need to be looking. Before being appointed, I attended a conference where a speaker on security said the greatest problem for... read more

Categories: BlogTags: , , , ,