{"id":1654,"date":"2011-02-04T10:06:39","date_gmt":"2011-02-04T18:06:39","guid":{"rendered":"http:\/\/blog.cosaint.net\/?p=1654"},"modified":"2023-03-01T16:55:03","modified_gmt":"2023-03-01T16:55:03","slug":"privacy-and-security-rules-cover-information-not-technology","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/privacy-and-security-rules-cover-information-not-technology\/","title":{"rendered":"Privacy and Security Rules Cover Information &#8211; Not Technology"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-670\" title=\"copier\" src=\"https:\/\/www.empowerbpo.com\/blog\/wp-content\/uploads\/2009\/11\/copier.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2009\/11\/copier.jpg 150w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2009\/11\/copier-100x100.jpg 100w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>With few exceptions, rules relating to privacy and security such as HIPAA and GLBA (Gramm Leach Bliley) cover the information, and don&#8217;t specifically relate to any particular technologies. So, they apply whether you&#8217;re using your PC, a fax machine, a photocopier, a USB flash drive, or even your cell phone.<\/p>\n<p>Here&#8217;s an excellent post on the subject &#8211; <a href=\"http:\/\/privacyguidance.com\/blog\/hipaa-it-is-about-the-information\/\" target=\"_blank\" rel=\"noopener nofollow\">HIPAA: It\u2019s About the Information!<\/a> &#8211; from Rebecca Herold (&#8220;The Privacy Professor&#8221;). It focuses on fax machines (a topic that we covered in an earlier post on this blog) but the same thinking applies to <b>any<\/b> equipment that you use to access, process, or store sensitive information.<\/p>\n<p>For more about this topic, see these posts from our blog:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.empowerbpo.com\/blog\/fax-insecurity\" rel=\"nofollow noopener\" target=\"_blank\">Fax Insecurity<\/a><\/li>\n<li><a href=\"https:\/\/www.empowerbpo.com\/blog\/photocopiers-and-information-security\/\" rel=\"nofollow noopener\" target=\"_blank\">Photocopiers and Information Security<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>With few exceptions, rules relating to privacy and security such as HIPAA and GLBA (Gramm Leach Bliley) cover the information, and don&#8217;t specifically relate to any particular technologies. So, they apply whether you&#8217;re using your PC, a fax machine, a photocopier, a USB flash drive, or even your cell phone. Here&#8217;s an excellent post on [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-1654","post","type-post","status-publish","format-standard","hentry","category-compliance","category-infosec"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/1654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=1654"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/1654\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=1654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=1654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=1654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}