JohnResearch

Technology, Software, Systems, Security, Data, Engineering, Governance, AIML, Analytics

Jun 22, 2024

Role Security, The Cloud, and The Private Cloud Play With PHI and PII

Security. Security are the controls that protect data from unauthorized users. Security is often associated with information systems and technology hardware and software. From a security operations perspective, the cloud...

Jun 20, 2024

How Privacy, Compliance, and Protocols Play Together to Protect Your PHI and PII

Consent. Let’s begin with the first thing that must be present. You cannot get very far without consent or permission from the people you’re collecting data from. Mitigating cyber or...

Jun 18, 2024

Top 5 Cloud Data Privacy And Security Best Practices For Data Projects in 2024

An earlier post talked about data privacy in cloud-agnostic settings. This post builds on that post while involving the cloud, which is everywhere these days. Companies want the cloud because...

Jun 16, 2024

Top 5 Data Privacy Best Practices to Consider in Data Collection Projects in 2024

It isn’t surprising that as the web has made it easier to collect data, but so have data laws proliferated. Data is vulnerable to a plethora of risks, so having...

Jun 16, 2024

Welcome!

You’ll find this site useful if you are interested in technology, security, data, and research. This site is a space where I post best practices and lessons learned from past...

Site maintained by johnresearches