Has encryption protect google and yahoo against NSA snooping, simply not. Was the NSA protected against data extract by an ‘authorized’ user who threatened the
Identity and Access Management (IAM) has two seemingly opposed purposes: to enable user access to information, and to block user access to restricted information. In
Governance Analysis is a logic-based, computer assisted framework for validating legal compliance of enterprise governance models. This framework is intended to help check whether governance
Recently I have been working on a formal framework for evaluating the maturity of de-identification services within an organization. The framework gauges the level of
We have developed an enterprise reference model used to conceptualize enterprise elements. The model suggests three planes: Subject and role-grouping plane: In this plane, the
A set of enterprise requirements is considered compliant with the law if the requirements are legally consistent and compliant with respect to the law.
Consent Management in Ontario Depending on the type of personal health information (PHI) involved, Ontarians can withdraw consent to the use and disclosure of their PHI by