Search

Data privacy checkup : strategies for minimizing risk when sharing health information

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20160022513</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20220911211939.0</controlfield>
    <controlfield tag="008">160718e20160718esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20160009101</subfield>
      <subfield code="a">Wehbe, Sam</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Data privacy checkup</subfield>
      <subfield code="b">: strategies for minimizing risk when sharing health information</subfield>
      <subfield code="c">Sam Wehbe</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">As health care organizations try to capitalize on big data, their risks are increasing exponentially. To address this issue, professionals trained in health data risk management must guide their organizations in monitoring emerging risks and establishing defensible health data-sharing practices.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080592875</subfield>
      <subfield code="a">Protección de datos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080580711</subfield>
      <subfield code="a">Gestión sanitaria</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080636272</subfield>
      <subfield code="a">Tratamiento automatizado de datos de caracter personal</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022717</subfield>
      <subfield code="a">Big data</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080629243</subfield>
      <subfield code="a">Instituciones sanitarias públicas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080629236</subfield>
      <subfield code="a">Instituciones sanitarias privadas</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">28/06/2016 Volumen 63 Número 5 - junio 2016 , p. 22-24</subfield>
    </datafield>
  </record>
</collection>