In this article, we discuss the methods, benefits, and limitations of encrypting data at rest. While encrypting data at rest can be a useful component in a data security toolbox, it must be implemented with a full understanding of the protection it does (and does not) provide.
There has been a
shift away from geographic-based/dominated HIEs to product-dominated HIEs. What does this mean for public health, especially when most public health data exchange happens on a jurisdiction-by-jurisdiction basis?
Most public health information technology projects rely on strong collaboration to be successful, especially across vendor-client boundaries. In this article we identify some additional successful strategies.
Categorical funding, insufficient resources, and lack of agency vision keep public health systems isolated and unintegrated – a phenomenon often referred to as “siloed” systems. This pair of articles tries to re-conceive this notion not once, but twice.