Trustworthy organizations do what they should even in the absence of legal enforcement

Joseph Conn of Modern Healthcare called attention in a blog post yesterday to the almost complete absence of civil penalties imposed against violators of the HIPAA Security and Privacy rules, pointing out that without some credible…

Public trust in health IT as a case study in system trust

In a typically insightful blog post last weekend, Margalit Gur-Arie considers issues of trust in electronic health records and other health information technology through a comparison with the banking system, financial institutions, and the use of…

It’s hard to be confident in unambiguous usage of “trust”

One of the consistent challenges with researching and writing about trust is separating the sociological and economic and organizational meanings of the word trust from the everyday uses of the term, whether in business or social…

Security and privacy rules and regulations insufficient to engender public trust in HIEs

A lawsuit filed last month by the Rhode Island chapter of the American Civil Liberties Union (ACLU) against the state Department of Health charges that the rules the state issued regarding its planned health information exchange…

Success of government “identity ecosystem” depends on trust in government

It’s not without some irony that some of the most stringent early objections to the administration’s recently released draft National Strategy for Trusted Identities in Cyberspace (NSTIC) focus on the extent to which the government itself…

Individuals and organizations have different requirements for trusted identity validation

A closer look at the structure of the administration’s newly released National Strategy for Trusted Identities inCyberspace (NSTIC) makes clear that while the “identity ecosystem” envisioned in the Strategy offers anticipated benefits for both individual citizens…

National Strategy for Trusted Identities embodies claims-based identity management

Last week, the White House released a draft of its new National Strategy for Trusted Identities in Cyberspace (NSTIC), which is intended to create a so-called “identity ecosystem” in which individuals, organizations, and other entities rely…