The National Cybersecurity Center of Excellence
(NCCoE) is taking a stab at Best Practices.
NIST –
Securing Electronic Health Records on Mobile Devices
by Sabrina
I. Pacifici on Jul 24, 2015
“Stolen personal information can have negative
financial impacts, but stolen medical information cuts to the very
core of personal privacy. Medical identity theft already costs
billions of dollars each year, and altered medical information can
put a person’s health at risk through misdiagnosis, delayed
treatment or incorrect prescriptions. Yet, the use of mobile devices
to store, access, and transmit electronic health care records is
outpacing the privacy and security protections on those devices.”
The NCCoE
has released a draft of its first cybersecurity practice guide,
“Securing Electronic Health Records on Mobile Devices,”
and invites you to download the draft and provide
feedback. For ease of use, the draft guide is available to
download in sections:
Or you can get a
.zip file of all volumes, plus manifest and template files
referred to in SP 1800-1c (4.82 MB).”
Has anyone collected Best Practices here?
I wish every local community had the kind of
detailed reporting on student privacy issues that Melinda J.
Overstreet provides in her coverage of a change in Glasgow
Independent Schools’ policies. From the newly drafted policies:
“In the school environment, a search is permissible where a school official has reasonable grounds, a ‘suspicion,’ based upon the totality of the circumstances, for suspecting that the search will reveal evidence that the student has violated either the law, district policy, or rules of the school. Reasonable suspicion must be based on ‘individualized suspicion of wrongdoing,’” the policy says.
The revised policy also covers canine searches:
“School premises may be randomly monitored with a trained canine for contraband, including but not limited to weapons, firearms, alcohol, drugs and drug paraphernalia. Canine monitoring does not constitute a search.”
The policy cites a federal case immediately after that statement.
Read more on Glasgow
Daily Times. The revised policies seems pretty consistent with
what we’ve seen in other districts. What the reporting doesn’t
mention, though, and I don’t know if it’s handled in the existing
policies, is the search of electronic devices or demands that
students turn over their passwords for a search. I don’t see the
student conduct handbook on the district’s web site (maybe I missed
it?), so I don’t know if the district’s policy is that it can and
will search student electronics if they suspect cyberbullying or any
other undesirable behavior committed from the student’s home on
their own time.
Is there an assumption that social media contains
what amounts to a confession before the event? If so, can we be far
from “pre-crime” arrests as in the movie “Minority Report?”
Oklahoma
police search social media to find motive behind 5 deadly stabbings
The US is beginning to notice that we have an old
and poorly maintained infrastructure. OR do we face a bunch of
want-to-be terrorists cutting power lines or committing other
less-than-catastrophic acts that are getting lost in the failures due
to neglect? OR is that my professional paranoia showing through?
NJ Transit
Apologizes After Power Woes Cause 3 Days of Suspensions, Delays
(Related)
Flight
Cancellations Follow Power Outage at New York City’s La Guardia
Airport
You know (and Hillary should have known) that this
is going to be “discussed” throughout the campaign. What seems
to have been lost is that no one has identified a secure
communications channel that was used to keep classified information
out of these emails. (I'd also mention that failure to mark an email
as classified does not make that email unclassified.)
Two inspectors general have asked the Justice
Department to open a criminal investigation into whether sensitive
government information was mishandled in connection with the personal
email account Hillary Rodham Clinton used as secretary of state,
senior government officials said Thursday.
… It is not clear if any of the information in
the emails was marked as classified by the State Department when Mrs.
Clinton sent or received them.
Perspective. Apparently, we would rather watch a
“How to” video than read a book.
Video based
search makes YouTube second largest search engine
by Sabrina
I. Pacifici on Jul 24, 2015
Search Engine Land: “YouTube
is arguably the second largest search engine on the Web. It is
the third most visited site
on the Web, according to Alexa
and SimilarWeb.
Recent information released
by Google has shown that more and more users are using YouTube as
a search engine. Searches
related to “how to” on YouTube are growing 70% year over year.
It is also no secret that video content is more engaging than a page
of text and can be much more informative. YouTube’s popularity and
reach are also expanded by its inclusion in both Google Web and Video
search.”
For my students. (I'm please to find that I'm not
doing everything wrong.)
The
Essential Guide to Crafting a Work Email
I'll past this article next to the library
scanner.
What’s
The Best Free OCR or ICR Program For Manuscript Transcription?
Optical
Character Recognition (OCR) and Intelligent
Character Recognition (ICR)
For all my students.
The Best
Alternatives to Google News That Help You Stay Current
Mainstream: Bing
News
Personalized: Flipboard
Tech: Techmeme
Politics: Memeorandum
Alternative: Digg
The Saturday funnies.
Hack
Education Weekly News
… Oregon Governor Kate Brown has signed
legislation creating a free community college program in the
state. (Related: Who’s
against tuition-free education?)
… NSA
summer camps: “More hacking than hiking.”
No comments:
Post a Comment