Use your computer fearlessly.

Mission Services Articles Research

everyone: older news

business: Worms

Data Privacy & Cybersecurity

by Brent Kirkpatrick

(Date Written: 1/30/2020. Date Published: .)

Cybersecurity can be somewhat disentangled from questions of data privacy.

Data privacy, governed by paperwork, can be separated from technical issues of cybersecurity. HIPAA itself regulates physical security, cybersecurity, and data exchange. When a cybersecurity threat presents itself, the PHI can be removed from the protected computers, and the cybersecurity team can proceed without regard th HIPAA regulations.

The advantage of this approach is is multi-faceted:

  1. any exploits discovered can immeadeately be reported to the FBI (as required by federal mandate)
  2. the investigations can be conducted by the best professionals in the field
  3. the protected computers can be mailed off-site

syringe with pills

Protection of data privacy is by necessity accomplished by a combination of data privacy controls and cybersecurity controls. By disentangling the data privacy controls from the hacked computers, cybersecurity teams are free to do their jobs.

Please contact us at Intrepid Net Computing if you want a personalized cybersecurity.

defendIT image

defendIT (TM). AI-driven incident response measures derived from security incident data.


Chris Culnane, Benjamin I. P. Rubinstein, and Vanessa Teague. Health Data in an Open World. arXiv:1712.05627. 2017.

Brent Kirkpatrick. Open Letter to Genetics Researchers. 2016.

Business Articles

New Technologies for a New Cybersecurity Marketplace

Panther Shadow: A Linux Worm


Why Clean-Up Hacking?

INC Logo

What Is New? | Contact | Tips

© 2015-2021 Intrepid Net Computing. All rights reserved.