Comprehensive software reviews to make better IT decisions
PHEMI: A Data Privacy Tool for Healthcare Providers
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor; thus, allowing such data to be leveraged in multiple use cases without compromising privacy.
Rather than focusing on managing compliance obligations like many other data privacy platforms, PHEMI provides capabilities around maintaining data-subject anonymity while data analysis is taking place.
PHEMI uses a combination of data classification and meta-tagging to indicate data sensitivity and what information needs obfuscating (and to what level) based on who is accessing it. This prevents unnecessary sprawl of sensitive data and limits the potential dangers of data processing.
This feature makes the product particularly useful for healthcare organizations. It allows patient records to be "fully available" to a primary care physician; "mostly available" to consulting physicians; reduced to specific (but non-personal) indicators for researchers; non-personal summaries for data scientists; and tokenized representations for systems administrators.
PHEMI’s industry roots are in healthcare, which is what accounts for the company’s industry-specific marketing. However, this tool could be used by any organization that is conducting data analysis at multiple levels and looking for an easy-to-use solution to protect the privacy of their data subjects. Yet for those in the healthcare space, it doesn’t hurt to have a vendor who is well-acquainted with the data flows of your industry and its unique challenges.
Want to Know More?
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat landscape has experienced enormous change. These noticeable shifts force us to consider rethinking and retooling how we address risk.
In an interview with Allison Furneaux, VP Marketing at CyberSaint Inc., developers of CyberStrong Integrated Risk Management platform in June 2020, Allison indicated that its focus has been on cybersecurity from the beginning.
LogicGate is a governance, risk and compliance automation platform offered by LogicGate Inc., headquartered in Chicago, that helps organizations to automate their risk processes.
I recently had the opportunity to speak with Jason Rohlf, VP Solutions, Mark Scheinkoenig, VP Commercial Sales, and Emily Figg, VP Marketing about their GRC solution at Onspring to discuss the product audience and upcoming features.
The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.
The International Association of Privacy Professionals (IAPP) has released its 2020 Privacy Tech Vendor report, reviewing key software solution vendors within the space. This year’s report highlighted the recent addition of Data Subject Request (DSR) to the feature categories.
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.