Evaluating technical tools and services as an exercise in trust

People often seek tools and technology services to help protect security and privacy of information, but when evaluating such technical tools, it can be equally important to consider the source of the tool to determine whether…

Trustworthy organizations do what they should even in the absence of legal enforcement

Joseph Conn of Modern Healthcare called attention in a blog post yesterday to the almost complete absence of civil penalties imposed against violators of the HIPAA Security and Privacy rules, pointing out that without some credible…

Public trust in health IT as a case study in system trust

In a typically insightful blog post last weekend, Margalit Gur-Arie considers issues of trust in electronic health records and other health information technology through a comparison with the banking system, financial institutions, and the use of…

It’s hard to be confident in unambiguous usage of “trust”

One of the consistent challenges with researching and writing about trust is separating the sociological and economic and organizational meanings of the word trust from the everyday uses of the term, whether in business or social…

Security and privacy rules and regulations insufficient to engender public trust in HIEs

A lawsuit filed last month by the Rhode Island chapter of the American Civil Liberties Union (ACLU) against the state Department of Health charges that the rules the state issued regarding its planned health information exchange…

Success of government “identity ecosystem” depends on trust in government

It’s not without some irony that some of the most stringent early objections to the administration’s recently released draft National Strategy for Trusted Identities in Cyberspace (NSTIC) focus on the extent to which the government itself…

Individuals and organizations have different requirements for trusted identity validation

A closer look at the structure of the administration’s newly released National Strategy for Trusted Identities inCyberspace (NSTIC) makes clear that while the “identity ecosystem” envisioned in the Strategy offers anticipated benefits for both individual citizens…